opensuse-su-2022:0363-1
Vulnerability from csaf_opensuse
Published
2022-02-10 16:01
Modified
2022-02-10 16:01
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes. The following security bugs were fixed: - CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254). - CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880). - CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371). - CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065). - CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867). - CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767). - CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864). - CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861). - CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184). - CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723). - CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227). The following security references were added to already fixed issues: - CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802). The following non-security bugs were fixed: - ACPI: battery: Add the ThinkPad 'Not Charging' quirk (git-fixes). - ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes). - ACPICA: Fix wrong interpretation of PCC address (git-fixes). - ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes). - ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes). - ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes). - ALSA: seq: Set upper limit of processed events (git-fixes). - ASoC: mediatek: mt8173: fix device_node leak (git-fixes). - Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes). - Documentation: fix firewire.rst ABI file path error (git-fixes). - HID: apple: Do not reset quirks when the Fn key is not found (git-fixes). - HID: quirks: Allow inverting the absolute X/Y values (git-fixes). - HID: uhid: Fix worker destroying device without any protection (git-fixes). - HID: wacom: Reset expected and received contact counts at the same time (git-fixes). - PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes). - RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176). - RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176). - ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes). - arm64: Kconfig: add a choice for endianness (jsc#SLE-23432). - asix: fix wrong return value in asix_check_host_enable() (git-fixes). - ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes). - ath10k: Fix tx hanging (git-fixes). - ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes). - batman-adv: allow netlink usage in unprivileged containers (git-fixes). - btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009). - btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009). - btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009). - cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291). - clk: si5341: Fix clock HW provider cleanup (git-fixes). - crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes). - drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes). - drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes). - drm/etnaviv: limit submit sizes (git-fixes). - drm/etnaviv: relax submit size limits (git-fixes). - drm/lima: fix warning when CONFIG_DEBUG_SG=y & CONFIG_DMA_API_DEBUG=y (git-fixes). - drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes). - drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes). - drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes). - drm/msm: Fix wrong size calculation (git-fixes). - drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes). - drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes). - drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes). - drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes). - ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267). - floppy: Add max size check for user space request (git-fixes). - gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes). - gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes). - hv_netvsc: Set needed_headroom according to VF (bsc#1193506). - hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes). - hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes). - hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes). - hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes). - hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes). - i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes). - i2c: i801: Do not silently correct invalid transfer size (git-fixes). - i2c: mpc: Correct I2C reset procedure (git-fixes). - ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713). - ibmvnic: Update driver return codes (bsc#1195293 ltc#196198). - ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713). - ibmvnic: init ->running_cap_crqs early (bsc#1195073 ltc#195713). - ibmvnic: remove unused ->wait_capability (bsc#1195073 ltc#195713). - ibmvnic: remove unused defines (bsc#1195293 ltc#196198). - igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634). - iwlwifi: fix leaks/bad data after failed firmware load (git-fixes). - iwlwifi: mvm: Fix calculation of frame length (git-fixes). - iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes). - iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes). - iwlwifi: remove module loading failure message (git-fixes). - lib82596: Fix IRQ check in sni_82596_probe (git-fixes). - lightnvm: Remove lightnvm implemenation (bsc#1191881). - mac80211: allow non-standard VHT MCS-10/11 (git-fixes). - media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes). - media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes). - media: igorplugusb: receiver overflow should be reported (git-fixes). - media: m920x: do not use stack on USB reads (git-fixes). - media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes). - media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes). - media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes). - mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488). - mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes). - mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes). - mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes). - mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes). - net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506). - net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506). - net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464). - net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172). - net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464). - net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428). - net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447). - net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447). - net: bridge: vlan: fix single net device option dumping (bsc#1176447). - net: mana: Add RX fencing (bsc#1193506). - net: mana: Add XDP support (bsc#1193506). - net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405). - net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405). - net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405). - net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405). - net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405). - net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405). - net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405). - net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353). - netdevsim: set .owner to THIS_MODULE (bsc#1154353). - nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes). - nvme: add 'iopolicy' module parameter (bsc#1177599 bsc#1193096). - phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes). - phylib: fix potential use-after-free (git-fixes). - pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes). - pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes). - powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865). - regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes). - rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes). - sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)). - sched/numa: Fix is_core_idle() (git fixes (sched/numa)). - scripts/dtc: dtx_diff: remove broken example from help text (git-fixes). - serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes). - serial: Fix incorrect rs485 polarity on uart open (git-fixes). - serial: amba-pl011: do not request memory region twice (git-fixes). - serial: core: Keep mctrl register state and cached copy in sync (git-fixes). - serial: pl010: Drop CR register reset on set_termios (git-fixes). - serial: stm32: fix software flow control transfer (git-fixes). - supported.conf: mark rtw88 modules as supported (jsc#SLE-22690) - tty: n_gsm: fix SW flow control encoding/handling (git-fixes). - ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes). - usb: common: ulpi: Fix crash in ulpi_match() (git-fixes). - usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes). - usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes). - usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes). - usb: roles: fix include/linux/usb/role.h compile issue (git-fixes). - usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes). - usb: uhci: add aspeed ast2600 uhci support (git-fixes). - vfio/iommu_type1: replace kfree with kvfree (git-fixes). - video: hyperv_fb: Fix validation of screen resolution (git-fixes). - vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353). - workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062). - x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes). - xfrm: fix MTU regression (bsc#1185377, bsc#1194048).
Patchnames
openSUSE-SLE-15.3-2022-363
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "critical"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 15 SP3 Azure kernel was updated to receive various security and bugfixes.\n\n\nThe following security bugs were fixed:\n\n- CVE-2022-0435: Fixed remote stack overflow in net/tipc module that validate domain record count on input (bsc#1195254).\n- CVE-2022-0330: Fixed flush TLBs before releasing backing store (bsc#1194880).\n- CVE-2022-0286: Fixed null pointer dereference in bond_ipsec_add_sa() that may have lead to local denial of service (bnc#1195371).\n- CVE-2022-22942: Fixed stale file descriptors on failed usercopy (bsc#1195065).\n- CVE-2021-45095: Fixed refcount leak in pep_sock_accept in net/phonet/pep.c (bnc#1193867).\n- CVE-2021-44733: Fixed a use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem, that could have occured because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object (bnc#1193767).\n- CVE-2021-39657: Fixed out of bounds read due to a missing bounds check in ufshcd_eh_device_reset_handler of ufshcd.c. This could lead to local information disclosure with System execution privileges needed (bnc#1193864).\n- CVE-2021-39648: Fixed possible disclosure of kernel heap memory due to a race condition in gadget_dev_desc_UDC_show of configfs.c. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation (bnc#1193861).\n- CVE-2021-22600: Fixed double free bug in packet_set_ring() in net/packet/af_packet.c that could have been exploited by a local user through crafted syscalls to escalate privileges or deny service (bnc#1195184).\n- CVE-2020-28097: Fixed out-of-bounds read in vgacon subsystem that mishandled software scrollback (bnc#1187723).\n- CVE-2021-4159: Fixed kernel ptr leak vulnerability via BPF in coerce_reg_to_size (bsc#1194227).\n\n\nThe following security references were added to already fixed issues:\n\n- CVE-2021-39685: Fixed USB gadget buffer overflow caused by too large endpoint 0 requests (bsc#1193802).\n\n\nThe following non-security bugs were fixed:\n\n- ACPI: battery: Add the ThinkPad \u0027Not Charging\u0027 quirk (git-fixes).\n- ACPICA: Executer: Fix the REFCLASS_REFOF case in acpi_ex_opcode_1A_0T_1R() (git-fixes).\n- ACPICA: Fix wrong interpretation of PCC address (git-fixes).\n- ACPICA: Hardware: Do not flush CPU cache when entering S4 and S5 (git-fixes).\n- ACPICA: Utilities: Avoid deleting the same object twice in a row (git-fixes).\n- ACPICA: actypes.h: Expand the ACPI_ACCESS_ definitions (git-fixes).\n- ALSA: seq: Set upper limit of processed events (git-fixes).\n- ASoC: mediatek: mt8173: fix device_node leak (git-fixes).\n- Bluetooth: Fix debugfs entry leak in hci_register_dev() (git-fixes).\n- Documentation: fix firewire.rst ABI file path error (git-fixes).\n- HID: apple: Do not reset quirks when the Fn key is not found (git-fixes).\n- HID: quirks: Allow inverting the absolute X/Y values (git-fixes).\n- HID: uhid: Fix worker destroying device without any protection (git-fixes).\n- HID: wacom: Reset expected and received contact counts at the same time (git-fixes).\n- PCI: Add function 1 DMA alias quirk for Marvell 88SE9125 SATA controller (git-fixes).\n- RDMA/core: Clean up cq pool mechanism (jsc#SLE-15176).\n- RDMA/rxe: Remove the unnecessary variable (jsc#SLE-15176).\n- ar5523: Fix null-ptr-deref with unexpected WDCMSG_TARGET_START reply (git-fixes).\n- arm64: Kconfig: add a choice for endianness (jsc#SLE-23432).\n- asix: fix wrong return value in asix_check_host_enable() (git-fixes).\n- ata: pata_platform: Fix a NULL pointer dereference in __pata_platform_probe() (git-fixes).\n- ath10k: Fix tx hanging (git-fixes).\n- ath9k: Fix out-of-bound memcpy in ath9k_hif_usb_rx_stream (git-fixes).\n- batman-adv: allow netlink usage in unprivileged containers (git-fixes).\n- btrfs: tree-checker: Add EXTENT_ITEM and METADATA_ITEM check (bsc#1195009).\n- btrfs: tree-checker: annotate all error branches as unlikely (bsc#1195009).\n- btrfs: tree-checker: check for BTRFS_BLOCK_FLAG_FULL_BACKREF being set improperly (bsc#1195009).\n- cgroup/cpuset: Fix a partition bug with hotplug (bsc#1194291).\n- clk: si5341: Fix clock HW provider cleanup (git-fixes).\n- crypto: qat - fix undetected PFVF timeout in ACK loop (git-fixes).\n- drm/amdgpu: fixup bad vram size on gmc v8 (git-fixes).\n- drm/bridge: megachips: Ensure both bridges are probed before registration (git-fixes).\n- drm/etnaviv: limit submit sizes (git-fixes).\n- drm/etnaviv: relax submit size limits (git-fixes).\n- drm/lima: fix warning when CONFIG_DEBUG_SG=y \u0026 CONFIG_DMA_API_DEBUG=y (git-fixes).\n- drm/msm/dpu: invalid parameter check in dpu_setup_dspp_pcc (git-fixes).\n- drm/msm/dsi: invalid parameter check in msm_dsi_phy_enable (git-fixes).\n- drm/msm/hdmi: Fix missing put_device() call in msm_hdmi_get_phy (git-fixes).\n- drm/msm: Fix wrong size calculation (git-fixes).\n- drm/nouveau/kms/nv04: use vzalloc for nv04_display (git-fixes).\n- drm/nouveau/pmu/gm200-: avoid touching PMU outside of DEVINIT/PREOS/ACR (git-fixes).\n- drm/radeon: fix error handling in radeon_driver_open_kms (git-fixes).\n- drm: panel-orientation-quirks: Add quirk for the Lenovo Yoga Book X91F/L (git-fixes).\n- ext4: set csum seed in tmp inode while migrating to extents (bsc#1195267).\n- floppy: Add max size check for user space request (git-fixes).\n- gpio: aspeed: Convert aspeed_gpio.lock to raw_spinlock (git-fixes).\n- gpiolib: acpi: Do not set the IRQ type if the IRQ is already in use (git-fixes).\n- hv_netvsc: Set needed_headroom according to VF (bsc#1193506).\n- hwmom: (lm90) Fix citical alarm status for MAX6680/MAX6681 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6646/6647/6649 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6654 (git-fixes).\n- hwmon: (lm90) Mark alert as broken for MAX6680 (git-fixes).\n- hwmon: (lm90) Reduce maximum conversion rate for G781 (git-fixes).\n- i2c: designware-pci: Fix to change data types of hcnt and lcnt parameters (git-fixes).\n- i2c: i801: Do not silently correct invalid transfer size (git-fixes).\n- i2c: mpc: Correct I2C reset procedure (git-fixes).\n- ibmvnic: Allow extra failures before disabling (bsc#1195073 ltc#195713).\n- ibmvnic: Update driver return codes (bsc#1195293 ltc#196198).\n- ibmvnic: do not spin in tasklet (bsc#1195073 ltc#195713).\n- ibmvnic: init -\u003erunning_cap_crqs early (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused -\u003ewait_capability (bsc#1195073 ltc#195713).\n- ibmvnic: remove unused defines (bsc#1195293 ltc#196198).\n- igc: Fix TX timestamp support for non-MSI-X platforms (bsc#1160634).\n- iwlwifi: fix leaks/bad data after failed firmware load (git-fixes).\n- iwlwifi: mvm: Fix calculation of frame length (git-fixes).\n- iwlwifi: mvm: Increase the scan timeout guard to 30 seconds (git-fixes).\n- iwlwifi: mvm: synchronize with FW after multicast commands (git-fixes).\n- iwlwifi: remove module loading failure message (git-fixes).\n- lib82596: Fix IRQ check in sni_82596_probe (git-fixes).\n- lightnvm: Remove lightnvm implemenation (bsc#1191881).\n- mac80211: allow non-standard VHT MCS-10/11 (git-fixes).\n- media: b2c2: Add missing check in flexcop_pci_isr: (git-fixes).\n- media: coda/imx-vdoa: Handle dma_set_coherent_mask error codes (git-fixes).\n- media: igorplugusb: receiver overflow should be reported (git-fixes).\n- media: m920x: do not use stack on USB reads (git-fixes).\n- media: saa7146: hexium_gemini: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: saa7146: hexium_orion: Fix a NULL pointer dereference in hexium_attach() (git-fixes).\n- media: uvcvideo: Increase UVC_CTRL_CONTROL_TIMEOUT to 5 seconds (git-fixes).\n- mlxsw: Only advertise link modes supported by both driver and device (bsc#1154488).\n- mmc: core: Fixup storing of OCR for MMC_QUIRK_NONSTD_SDIO (git-fixes).\n- mtd: nand: bbt: Fix corner case in bad block table handling (git-fixes).\n- mtd: rawnand: gpmi: Add ERR007117 protection for nfc_apply_timings (git-fixes).\n- mtd: rawnand: gpmi: Remove explicit default gpmi clock setting for i.MX6 (git-fixes).\n- net, xdp: Introduce xdp_init_buff utility routine (bsc#1193506).\n- net, xdp: Introduce xdp_prepare_buff utility routine (bsc#1193506).\n- net/mlx5: DR, Proper handling of unsupported Connect-X6DX SW steering (jsc#SLE-8464).\n- net/mlx5: E-Switch, fix changing vf VLANID (jsc#SLE-15172).\n- net/mlx5e: Protect encap route dev from concurrent release (jsc#SLE-8464).\n- net: allow retransmitting a TCP packet if original is still in queue (bsc#1188605 bsc#1187428).\n- net: bonding: fix bond_xmit_broadcast return value error bug (bsc#1176447).\n- net: bridge: vlan: fix memory leak in __allowed_ingress (bsc#1176447).\n- net: bridge: vlan: fix single net device option dumping (bsc#1176447).\n- net: mana: Add RX fencing (bsc#1193506).\n- net: mana: Add XDP support (bsc#1193506).\n- net: sch_generic: aviod concurrent reset and enqueue op for lockless qdisc (bsc#1183405).\n- net: sched: add barrier to ensure correct ordering for lockless qdisc (bsc#1183405).\n- net: sched: avoid unnecessary seqcount operation for lockless qdisc (bsc#1183405).\n- net: sched: fix packet stuck problem for lockless qdisc (bsc#1183405).\n- net: sched: fix tx action reschedule issue with stopped queue (bsc#1183405).\n- net: sched: fix tx action rescheduling issue during deactivation (bsc#1183405).\n- net: sched: replaced invalid qdisc tree flush helper in qdisc_replace (bsc#1183405).\n- net: sfp: fix high power modules without diagnostic monitoring (bsc#1154353).\n- netdevsim: set .owner to THIS_MODULE (bsc#1154353).\n- nfc: llcp: fix NULL error pointer dereference on sendmsg() after failed bind() (git-fixes).\n- nvme: add \u0027iopolicy\u0027 module parameter (bsc#1177599 bsc#1193096).\n- phy: uniphier-usb3ss: fix unintended writing zeros to PHY register (git-fixes).\n- phylib: fix potential use-after-free (git-fixes).\n- pinctrl: bcm2835: Add support for wake-up interrupts (git-fixes).\n- pinctrl: bcm2835: Match BCM7211 compatible string (git-fixes).\n- powerpc/book3s64/radix: make tlb_single_page_flush_ceiling a debugfs entry (bsc#1195183 ltc#193865).\n- regulator: qcom_smd: Align probe function with rpmh-regulator (git-fixes).\n- rsi: Fix use-after-free in rsi_rx_done_handler() (git-fixes).\n- sched/fair: Fix detection of per-CPU kthreads waking a task (git fixes (sched/fair)).\n- sched/numa: Fix is_core_idle() (git fixes (sched/numa)).\n- scripts/dtc: dtx_diff: remove broken example from help text (git-fixes).\n- serial: 8250: of: Fix mapped region size when using reg-offset property (git-fixes).\n- serial: Fix incorrect rs485 polarity on uart open (git-fixes).\n- serial: amba-pl011: do not request memory region twice (git-fixes).\n- serial: core: Keep mctrl register state and cached copy in sync (git-fixes).\n- serial: pl010: Drop CR register reset on set_termios (git-fixes).\n- serial: stm32: fix software flow control transfer (git-fixes).\n- supported.conf: mark rtw88 modules as supported (jsc#SLE-22690)\n- tty: n_gsm: fix SW flow control encoding/handling (git-fixes).\n- ucsi_ccg: Check DEV_INT bit only when starting CCG4 (git-fixes).\n- usb: common: ulpi: Fix crash in ulpi_match() (git-fixes).\n- usb: gadget: f_fs: Use stream_open() for endpoint files (git-fixes).\n- usb: gadget: f_sourcesink: Fix isoc transfer for USB_SPEED_SUPER_PLUS (git-fixes).\n- usb: hub: Add delay for SuperSpeed hub resume to let links transit to U0 (git-fixes).\n- usb: roles: fix include/linux/usb/role.h compile issue (git-fixes).\n- usb: typec: tcpm: Do not disconnect while receiving VBUS off (git-fixes).\n- usb: uhci: add aspeed ast2600 uhci support (git-fixes).\n- vfio/iommu_type1: replace kfree with kvfree (git-fixes).\n- video: hyperv_fb: Fix validation of screen resolution (git-fixes).\n- vxlan: fix error return code in __vxlan_dev_create() (bsc#1154353).\n- workqueue: Fix unbind_workers() VS wq_worker_running() race (bsc#1195062).\n- x86/gpu: Reserve stolen memory for first integrated Intel GPU (git-fixes).\n- xfrm: fix MTU regression (bsc#1185377, bsc#1194048).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-SLE-15.3-2022-363",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0363-1.json"
      },
      {
        "category": "self",
        "summary": "URL for openSUSE-SU-2022:0363-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for openSUSE-SU-2022:0363-1",
        "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/K4ZJSATCJ2GMGCX6RSG2TU2YU4DDOMVQ/"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154353",
        "url": "https://bugzilla.suse.com/1154353"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1154488",
        "url": "https://bugzilla.suse.com/1154488"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1160634",
        "url": "https://bugzilla.suse.com/1160634"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1176447",
        "url": "https://bugzilla.suse.com/1176447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1177599",
        "url": "https://bugzilla.suse.com/1177599"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1183405",
        "url": "https://bugzilla.suse.com/1183405"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1185377",
        "url": "https://bugzilla.suse.com/1185377"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187428",
        "url": "https://bugzilla.suse.com/1187428"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1187723",
        "url": "https://bugzilla.suse.com/1187723"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1188605",
        "url": "https://bugzilla.suse.com/1188605"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1191881",
        "url": "https://bugzilla.suse.com/1191881"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193096",
        "url": "https://bugzilla.suse.com/1193096"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193506",
        "url": "https://bugzilla.suse.com/1193506"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193767",
        "url": "https://bugzilla.suse.com/1193767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193802",
        "url": "https://bugzilla.suse.com/1193802"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193861",
        "url": "https://bugzilla.suse.com/1193861"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193864",
        "url": "https://bugzilla.suse.com/1193864"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1193867",
        "url": "https://bugzilla.suse.com/1193867"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194048",
        "url": "https://bugzilla.suse.com/1194048"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194227",
        "url": "https://bugzilla.suse.com/1194227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194291",
        "url": "https://bugzilla.suse.com/1194291"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1194880",
        "url": "https://bugzilla.suse.com/1194880"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195009",
        "url": "https://bugzilla.suse.com/1195009"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195062",
        "url": "https://bugzilla.suse.com/1195062"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195065",
        "url": "https://bugzilla.suse.com/1195065"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195073",
        "url": "https://bugzilla.suse.com/1195073"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195183",
        "url": "https://bugzilla.suse.com/1195183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195184",
        "url": "https://bugzilla.suse.com/1195184"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195254",
        "url": "https://bugzilla.suse.com/1195254"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195267",
        "url": "https://bugzilla.suse.com/1195267"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195293",
        "url": "https://bugzilla.suse.com/1195293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195371",
        "url": "https://bugzilla.suse.com/1195371"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2020-28097 page",
        "url": "https://www.suse.com/security/cve/CVE-2020-28097/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-22600 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-22600/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39648 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39657 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39657/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-39685 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-39685/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-4159 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-4159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-44733 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-44733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-45095 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-45095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0286 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0286/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0330 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0330/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-0435 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-0435/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-22942 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-22942/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2022-02-10T16:01:36Z",
      "generator": {
        "date": "2022-02-10T16:01:36Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2022:0363-1",
      "initial_release_date": "2022-02-10T16:01:36Z",
      "revision_history": [
        {
          "date": "2022-02-10T16:01:36Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
                "product": {
                  "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
                  "product_id": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch",
                "product": {
                  "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch",
                  "product_id": "kernel-source-azure-5.3.18-150300.38.40.4.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "kernel-azure-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
                "product": {
                  "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
                  "product_id": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                "product": {
                  "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64",
                  "product_id": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 15.3",
                "product": {
                  "name": "openSUSE Leap 15.3",
                  "product_id": "openSUSE Leap 15.3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:opensuse:leap:15.3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "kernel-azure-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch"
        },
        "product_reference": "kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-azure-5.3.18-150300.38.40.4.noarch as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch"
        },
        "product_reference": "kernel-source-azure-5.3.18-150300.38.40.4.noarch",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64"
        },
        "product_reference": "kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64 as component of openSUSE Leap 15.3",
          "product_id": "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        },
        "product_reference": "reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64",
        "relates_to_product_reference": "openSUSE Leap 15.3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2020-28097",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2020-28097"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vgacon subsystem in the Linux kernel before 5.8.10 mishandles software scrollback. There is a vgacon_scrolldelta out-of-bounds read, aka CID-973c096f6a85.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2020-28097",
          "url": "https://www.suse.com/security/cve/CVE-2020-28097"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1187723 for CVE-2020-28097",
          "url": "https://bugzilla.suse.com/1187723"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2020-28097"
    },
    {
      "cve": "CVE-2021-22600",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-22600"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A double free bug in packet_set_ring() in net/packet/af_packet.c can be exploited by a local user through crafted syscalls to escalate privileges or deny service. We recommend upgrading kernel past the effected versions or rebuilding past ec6af094ea28f0f2dda1a6a33b14cd57e36a9755",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-22600",
          "url": "https://www.suse.com/security/cve/CVE-2021-22600"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195184 for CVE-2021-22600",
          "url": "https://bugzilla.suse.com/1195184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195307 for CVE-2021-22600",
          "url": "https://bugzilla.suse.com/1195307"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-22600"
    },
    {
      "cve": "CVE-2021-39648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In gadget_dev_desc_UDC_show of configfs.c, there is a possible disclosure of kernel heap memory due to a race condition. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-160822094References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39648",
          "url": "https://www.suse.com/security/cve/CVE-2021-39648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193861 for CVE-2021-39648",
          "url": "https://bugzilla.suse.com/1193861"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-39648"
    },
    {
      "cve": "CVE-2021-39657",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39657"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In ufshcd_eh_device_reset_handler of ufshcd.c, there is a possible out of bounds read due to a missing bounds check. This could lead to local information disclosure with System execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-194696049References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39657",
          "url": "https://www.suse.com/security/cve/CVE-2021-39657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193864 for CVE-2021-39657",
          "url": "https://bugzilla.suse.com/1193864"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "low"
        }
      ],
      "title": "CVE-2021-39657"
    },
    {
      "cve": "CVE-2021-39685",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-39685"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In various setup methods of the USB gadget subsystem, there is a possible out of bounds write due to an incorrect flag check. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-210292376References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-39685",
          "url": "https://www.suse.com/security/cve/CVE-2021-39685"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193802 for CVE-2021-39685",
          "url": "https://bugzilla.suse.com/1193802"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194459 for CVE-2021-39685",
          "url": "https://bugzilla.suse.com/1194459"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-39685"
    },
    {
      "cve": "CVE-2021-4159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-4159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A vulnerability was found in the Linux kernel\u0027s EBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-4159",
          "url": "https://www.suse.com/security/cve/CVE-2021-4159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194227 for CVE-2021-4159",
          "url": "https://bugzilla.suse.com/1194227"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-4159"
    },
    {
      "cve": "CVE-2021-44733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-44733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free exists in drivers/tee/tee_shm.c in the TEE subsystem in the Linux kernel through 5.15.11. This occurs because of a race condition in tee_shm_get_from_id during an attempt to free a shared memory object.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-44733",
          "url": "https://www.suse.com/security/cve/CVE-2021-44733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193767 for CVE-2021-44733",
          "url": "https://bugzilla.suse.com/1193767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-44733"
    },
    {
      "cve": "CVE-2021-45095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-45095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "pep_sock_accept in net/phonet/pep.c in the Linux kernel through 5.15.8 has a refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-45095",
          "url": "https://www.suse.com/security/cve/CVE-2021-45095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1193867 for CVE-2021-45095",
          "url": "https://bugzilla.suse.com/1193867"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-45095"
    },
    {
      "cve": "CVE-2022-0286",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0286"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel. A null pointer dereference in bond_ipsec_add_sa() may lead to local denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0286",
          "url": "https://www.suse.com/security/cve/CVE-2022-0286"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195371 for CVE-2022-0286",
          "url": "https://bugzilla.suse.com/1195371"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-0286"
    },
    {
      "cve": "CVE-2022-0330",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0330"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A random memory access flaw was found in the Linux kernel\u0027s GPU i915 kernel driver functionality in the way a user may run malicious code on the GPU. This flaw allows a local user to crash the system or escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0330",
          "url": "https://www.suse.com/security/cve/CVE-2022-0330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1194880 for CVE-2022-0330",
          "url": "https://bugzilla.suse.com/1194880"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195950 for CVE-2022-0330",
          "url": "https://bugzilla.suse.com/1195950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0330"
    },
    {
      "cve": "CVE-2022-0435",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-0435"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A stack overflow flaw was found in the Linux kernel\u0027s TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-0435",
          "url": "https://www.suse.com/security/cve/CVE-2022-0435"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195254 for CVE-2022-0435",
          "url": "https://bugzilla.suse.com/1195254"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195308 for CVE-2022-0435",
          "url": "https://bugzilla.suse.com/1195308"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226672 for CVE-2022-0435",
          "url": "https://bugzilla.suse.com/1226672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-0435"
    },
    {
      "cve": "CVE-2022-22942",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-22942"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "The vmwgfx driver contains a local privilege escalation vulnerability that allows unprivileged users to gain access to files opened by other processes on the system through a dangling \u0027file\u0027 pointer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
          "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
          "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
          "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-22942",
          "url": "https://www.suse.com/security/cve/CVE-2022-22942"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195065 for CVE-2022-22942",
          "url": "https://bugzilla.suse.com/1195065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1195951 for CVE-2022-22942",
          "url": "https://bugzilla.suse.com/1195951"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 15.3:cluster-md-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:dlm-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:gfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-extra-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-livepatch-devel-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-azure-optional-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:kernel-devel-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-source-azure-5.3.18-150300.38.40.4.noarch",
            "openSUSE Leap 15.3:kernel-syms-azure-5.3.18-150300.38.40.1.x86_64",
            "openSUSE Leap 15.3:kselftests-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:ocfs2-kmp-azure-5.3.18-150300.38.40.4.x86_64",
            "openSUSE Leap 15.3:reiserfs-kmp-azure-5.3.18-150300.38.40.4.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2022-02-10T16:01:36Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-22942"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…