suse-su-2019:0801-1
Vulnerability from csaf_suse
Published
2019-03-29 06:09
Modified
2019-03-29 06:09
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.176 to receive various security and bugfixes. The following security bugs were fixed: - CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166). - CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179). The following non-security bugs were fixed: - ax25: fix possible use-after-free (bnc#1012382). - block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435). - block: do not use bio->bi_vcnt to figure out segment number (bsc#1128893). - bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413). - bpf: fix replace_map_fd_with_map_ptr's ldimm64 second imm field (bsc#1012382). - btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452). - ceph: avoid repeatedly adding inode to mdsc->snap_flush_list (bsc#1126773). - ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235). - ch: fixup refcounting imbalance for SCSI devices (bsc#1124235). - copy_mount_string: Limit string length to PATH_MAX (bsc#1082943). - device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770). - drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389). - drm: Fix error handling in drm_legacy_addctx (bsc#1106929) - drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929) - drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929) - drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929) - drm/vmwgfx: Do not double-free the mode stored in par->set_mode (bsc#1103429) - enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959). - enic: do not overwrite error code (bnc#1012382). - fbdev: chipsfb: remove set but not used variable 'size' (bsc#1106929) - ibmvnic: Report actual backing device speed and duplex values (bsc#1129923). - ibmvscsi: Fix empty event pool access during host removal (bsc#1119019). - input: mms114 - fix license module information (bsc#1087092). - iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237). - iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238). - iommu/vt-d: Check identity map for hot-added devices (bsc#1129239). - iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240). - ixgbe: fix crash in build_skb Rx code path (git-fixes). - kabi: protect struct inet_peer (kabi). - kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805). - KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137). - kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248). - kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248). - kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248). - kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248). - kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413). - kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414). - kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415). - kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416). - kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417). - kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418). - kvm: x86: Add AMD's EX_CFG to the list of ignored MSRs (bsc#1127082). - kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419). - libceph: handle an empty authorize reply (bsc#1126772). - mdio_bus: Fix use-after-free on device_register fails (git-fixes). - mfd: as3722: Handle interrupts on suspend (bnc#1012382). - mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382). - mISDN: fix a race in dev_expire_timer() (bnc#1012382). - mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes). - mlxsw: reg: Use correct offset in field definiton (git-fixes). - mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382). - mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731). - net: Add header for usage of fls64() (bnc#1012382). - net: Do not allocate page fragments that are not skb aligned (bnc#1012382). - net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes). - net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes). - net: Fix for_each_netdev_feature on Big endian (bnc#1012382). - net: fix IPv6 prefix route residue (bnc#1012382). - net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes). - net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes). - net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382). - net: lan78xx: Fix race in tx pending skb size calculation (git-fixes). - net/mlx4_core: drop useless LIST_HEAD (git-fixes). - net/mlx4_core: Fix qp mtt size calculation (git-fixes). - net/mlx4_core: Fix reset flow when in command polling mode (git-fixes). - net/mlx4: Fix endianness issue in qp context params (git-fixes). - net/mlx5: Continue driver initialization despite debugfs failure (git-fixes). - net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes). - net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes). - net/mlx5: fix uaccess beyond 'count' in debugfs read/write handlers (git-fixes). - net/mlx5: Fix use-after-free in self-healing flow (git-fixes). - net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes). - net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes). - net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes). - net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes). - net: qca_spi: Fix race condition in spi transfers (git-fixes). - net: stmmac: Fix a race in EEE enable callback (bnc#1012382). - net: stmmac: Fix a race in EEE enable callback (git-fixes). - net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes). - net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382). - PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241). - perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805). - perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805). - perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805). - perf/x86/intel: Fix memory corruption (bsc#1121805). - perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805). - perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805). - perf/x86/intel: Make cpuc allocations consistent (bsc#1121805). - phy: micrel: Ensure interrupts are reenabled on resume (git-fixes). - powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756). - powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756). - powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756). - powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756). - pppoe: fix reception of frames with no mac header (git-fixes). - pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes). - pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080). - rdma/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446). - Revert 'mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL' (bnc#1012382). - Revert 'x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls' (bsc#1128565). - s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561). - scsi: aacraid: Fix missing break in switch statement (bsc#1128696). - scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019). - scsi: lpfc: do not set queue->page_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725). - scsi: qla2xxx: Fix early srb free on abort (bsc#1121713). - scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713). - scsi: qla2xxx: Increase abort timeout value (bsc#1121713). - scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713). - scsi: qla2xxx: Return switch command on a timeout (bsc#1121713). - scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713). - scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713). - scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315). - sky2: Increase D3 delay again (bnc#1012382). - tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382). - tcp: tcp_v4_err() should be more careful (bnc#1012382). - team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382). - team: Free BPF filter when unregistering netdev (git-fixes). - tracing: Do not free iter->trace in fail path of tracing_open_pipe() (bsc#1129581). - vsock: cope with memory allocation failure at socket creation time (bnc#1012382). - vxlan: test dev->flags & IFF_UP before calling netif_rx() (bnc#1012382). - wireless: airo: potential buffer overflow in sprintf() (bsc#1120902). - x86: Add TSX Force Abort CPUID/MSR (bsc#1121805). - x86: Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT - x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382). - xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600). - xen: remove pre-xen3 fallback handlers (bsc#1065600). - xfs: remove filestream item xfs_inode reference (bsc#1127961).
Patchnames
SUSE-2019-801,SUSE-SLE-DESKTOP-12-SP3-2019-801,SUSE-SLE-HA-12-SP3-2019-801,SUSE-SLE-Live-Patching-12-SP3-2019-801,SUSE-SLE-SDK-12-SP3-2019-801,SUSE-SLE-SERVER-12-SP3-2019-801,SUSE-SLE-WE-12-SP3-2019-801
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\n\nThe SUSE Linux Enterprise 12 SP3 kernel was updated to 4.4.176 to receive various security and bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2019-9213: expand_downwards in mm/mmap.c lacked a check for the mmap minimum address, which made it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task (bnc#1128166).\n- CVE-2019-2024: A use-after-free when disconnecting a source was fixed which could lead to crashes. bnc#1129179).\n\nThe following non-security bugs were fixed:\n\n- ax25: fix possible use-after-free (bnc#1012382).\n- block_dev: fix crash on chained bios with O_DIRECT (bsc#1090435).\n- block: do not use bio-\u003ebi_vcnt to figure out segment number (bsc#1128893).\n- bnxt_re: Fix couple of memory leaks that could lead to IOMMU call traces (bsc#1020413).\n- bpf: fix replace_map_fd_with_map_ptr\u0027s ldimm64 second imm field (bsc#1012382).\n- btrfs: ensure that a DUP or RAID1 block group has exactly two stripes (bsc#1128452).\n- ceph: avoid repeatedly adding inode to mdsc-\u003esnap_flush_list (bsc#1126773).\n- ch: add missing mutex_lock()/mutex_unlock() in ch_release() (bsc#1124235).\n- ch: fixup refcounting imbalance for SCSI devices (bsc#1124235).\n- copy_mount_string: Limit string length to PATH_MAX (bsc#1082943).\n- device property: Fix the length used in PROPERTY_ENTRY_STRING() (bsc#1129770).\n- drivers: hv: vmbus: Check for ring when getting debug info (bsc#1126389).\n- drm: Fix error handling in drm_legacy_addctx (bsc#1106929)\n- drm/nouveau/bios/ramcfg: fix missing parentheses when calculating RON (bsc#1106929)\n- drm/nouveau/pmu: do not print reply values if exec is false (bsc#1106929)\n- drm/radeon/evergreen_cs: fix missing break in switch statement (bsc#1106929)\n- drm/vmwgfx: Do not double-free the mode stored in par-\u003eset_mode (bsc#1103429)\n- enic: add wq clean up budget (bsc#1075697, bsc#1120691. bsc#1102959).\n- enic: do not overwrite error code (bnc#1012382).\n- fbdev: chipsfb: remove set but not used variable \u0027size\u0027 (bsc#1106929)\n- ibmvnic: Report actual backing device speed and duplex values (bsc#1129923).\n- ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- input: mms114 - fix license module information (bsc#1087092).\n- iommu/dmar: Fix buffer overflow during PCI bus notification (bsc#1129237).\n- iommu/io-pgtable-arm-v7s: Only kmemleak_ignore L2 tables (bsc#1129238).\n- iommu/vt-d: Check identity map for hot-added devices (bsc#1129239).\n- iommu/vt-d: Fix NULL pointer reference in intel_svm_bind_mm() (bsc#1129240).\n- ixgbe: fix crash in build_skb Rx code path (git-fixes).\n- kabi: protect struct inet_peer (kabi).\n- kallsyms: Handle too long symbols in kallsyms.c (bsc#1126805).\n- KMPs: obsolete older KMPs of the same flavour (bsc#1127155, bsc#1109137).\n- kvm: arm/arm64: vgic-its: Check CBASER/BASER validity before enabling the ITS (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Check GITS_BASER Valid bit before saving tables (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix return value for device table restore (bsc#1109248).\n- kvm: arm/arm64: vgic-its: Fix vgic_its_restore_collection_table returned value (bsc#1109248).\n- kvm: nVMX: Do not halt vcpu when L1 is injecting events to L2 (bsc#1129413).\n- kvm: nVMX: Free the VMREAD/VMWRITE bitmaps if alloc_kvm_area() fails (bsc#1129414).\n- kvm: nVMX: NMI-window and interrupt-window exiting should wake L2 from HLT (bsc#1129415).\n- kvm: nVMX: Set VM instruction error for VMPTRLD of unbacked page (bsc#1129416).\n- kvm: VMX: Do not allow reexecute_instruction() when skipping MMIO instr (bsc#1129417).\n- kvm: vmx: Set IA32_TSC_AUX for legacy mode guests (bsc#1129418).\n- kvm: x86: Add AMD\u0027s EX_CFG to the list of ignored MSRs (bsc#1127082).\n- kvm: x86: IA32_ARCH_CAPABILITIES is always supported (bsc#1129419).\n- libceph: handle an empty authorize reply (bsc#1126772).\n- mdio_bus: Fix use-after-free on device_register fails (git-fixes).\n- mfd: as3722: Handle interrupts on suspend (bnc#1012382).\n- mfd: as3722: Mark PM functions as __maybe_unused (bnc#1012382).\n- mISDN: fix a race in dev_expire_timer() (bnc#1012382).\n- mlxsw: pci: Correctly determine if descriptor queue is full (git-fixes).\n- mlxsw: reg: Use correct offset in field definiton (git-fixes).\n- mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL (bnc#1012382).\n- mm,memory_hotplug: fix scan_movable_pages() for gigantic hugepages (bsc#1127731).\n- net: Add header for usage of fls64() (bnc#1012382).\n- net: Do not allocate page fragments that are not skb aligned (bnc#1012382).\n- net: dsa: bcm_sf2: Do not assume DSA master supports WoL (git-fixes).\n- net: dsa: mv88e6xxx: fix port VLAN maps (git-fixes).\n- net: Fix for_each_netdev_feature on Big endian (bnc#1012382).\n- net: fix IPv6 prefix route residue (bnc#1012382).\n- net/hamradio/6pack: Convert timers to use timer_setup() (git-fixes).\n- net/hamradio/6pack: use mod_timer() to rearm timers (git-fixes).\n- net: ipv4: use a dedicated counter for icmp_v4 redirect packets (bnc#1012382).\n- net: lan78xx: Fix race in tx pending skb size calculation (git-fixes).\n- net/mlx4_core: drop useless LIST_HEAD (git-fixes).\n- net/mlx4_core: Fix qp mtt size calculation (git-fixes).\n- net/mlx4_core: Fix reset flow when in command polling mode (git-fixes).\n- net/mlx4: Fix endianness issue in qp context params (git-fixes).\n- net/mlx5: Continue driver initialization despite debugfs failure (git-fixes).\n- net/mlx5e: Fix TCP checksum in LRO buffers (git-fixes).\n- net/mlx5: Fix driver load bad flow when having fw initializing timeout (git-fixes).\n- net/mlx5: fix uaccess beyond \u0027count\u0027 in debugfs read/write handlers (git-fixes).\n- net/mlx5: Fix use-after-free in self-healing flow (git-fixes).\n- net/mlx5: Return success for PAGE_FAULT_RESUME in internal error state (git-fixes).\n- net: mv643xx_eth: fix packet corruption with TSO and tiny unaligned packets (git-fixes).\n- net: phy: Avoid polling PHY with PHY_IGNORE_INTERRUPTS (git-fixes).\n- net: phy: bcm7xxx: Fix shadow mode 2 disabling (git-fixes).\n- net: qca_spi: Fix race condition in spi transfers (git-fixes).\n- net: stmmac: Fix a race in EEE enable callback (bnc#1012382).\n- net: stmmac: Fix a race in EEE enable callback (git-fixes).\n- net: thunderx: set tso_hdrs pointer to NULL in nicvf_free_snd_queue (git-fixes).\n- net/x25: do not hold the cpu too long in x25_new_lci() (bnc#1012382).\n- PCI/PME: Fix hotplug/sysfs remove deadlock in pcie_pme_remove() (bsc#1129241).\n- perf/x86: Add sysfs entry to freeze counters on SMI (bsc#1121805).\n- perf/x86/intel: Delay memory deallocation until x86_pmu_dead_cpu() (bsc#1121805).\n- perf/x86/intel: Do not enable freeze-on-smi for PerfMon V1 (bsc#1121805).\n- perf/x86/intel: Fix memory corruption (bsc#1121805).\n- perf/x86/intel: Generalize dynamic constraint creation (bsc#1121805).\n- perf/x86/intel: Implement support for TSX Force Abort (bsc#1121805).\n- perf/x86/intel: Make cpuc allocations consistent (bsc#1121805).\n- phy: micrel: Ensure interrupts are reenabled on resume (git-fixes).\n- powerpc/pseries: Add CPU dlpar remove functionality (bsc#1128756).\n- powerpc/pseries: Consolidate CPU hotplug code to hotplug-cpu.c (bsc#1128756).\n- powerpc/pseries: Factor out common cpu hotplug code (bsc#1128756).\n- powerpc/pseries: Perform full re-add of CPU for topology update post-migration (bsc#1128756).\n- pppoe: fix reception of frames with no mac header (git-fixes).\n- pptp: dst_release sk_dst_cache in pptp_sock_destruct (git-fixes).\n- pseries/energy: Use OF accessor function to read ibm,drc-indexes (bsc#1129080).\n- rdma/bnxt_re: Synchronize destroy_qp with poll_cq (bsc#1125446).\n- Revert \u0027mm, devm_memremap_pages: mark devm_memremap_pages() EXPORT_SYMBOL_GPL\u0027 (bnc#1012382).\n- Revert \u0027x86/platform/UV: Use efi_runtime_lock to serialise BIOS calls\u0027 (bsc#1128565).\n- s390/qeth: cancel close_dev work before removing a card (LTC#175898, bsc#1127561).\n- scsi: aacraid: Fix missing break in switch statement (bsc#1128696).\n- scsi: ibmvscsi: Fix empty event pool access during host removal (bsc#1119019).\n- scsi: lpfc: do not set queue-\u003epage_count to 0 if pc_sli4_params.wqpcnt is invalid (bsc#1127725).\n- scsi: qla2xxx: Fix early srb free on abort (bsc#1121713).\n- scsi: qla2xxx: Fix for double free of SRB structure (bsc#1121713).\n- scsi: qla2xxx: Increase abort timeout value (bsc#1121713).\n- scsi: qla2xxx: Move {get|rel}_sp to base_qpair struct (bsc#1121713).\n- scsi: qla2xxx: Return switch command on a timeout (bsc#1121713).\n- scsi: qla2xxx: Turn off IOCB timeout timer on IOCB completion (bsc#1121713).\n- scsi: qla2xxx: Use correct qpair for ABTS/CMD (bsc#1121713).\n- scsi: sym53c8xx: fix NULL pointer dereference panic in sym_int_sir() (bsc#1125315).\n- sky2: Increase D3 delay again (bnc#1012382).\n- tcp: clear icsk_backoff in tcp_write_queue_purge() (bnc#1012382).\n- tcp: tcp_v4_err() should be more careful (bnc#1012382).\n- team: avoid complex list operations in team_nl_cmd_options_set() (bnc#1012382).\n- team: Free BPF filter when unregistering netdev (git-fixes).\n- tracing: Do not free iter-\u003etrace in fail path of tracing_open_pipe() (bsc#1129581).\n- vsock: cope with memory allocation failure at socket creation time (bnc#1012382).\n- vxlan: test dev-\u003eflags \u0026 IFF_UP before calling netif_rx() (bnc#1012382).\n- wireless: airo: potential buffer overflow in sprintf() (bsc#1120902).\n- x86: Add TSX Force Abort CPUID/MSR (bsc#1121805).\n- x86: Fix incorrect value for X86_FEATURE_TSX_FORCE_ABORT\n- x86: livepatch: Treat R_X86_64_PLT32 as R_X86_64_PC32 (bnc#1012382).\n- xen, cpu_hotplug: Prevent an out of bounds access (bsc#1065600).\n- xen: remove pre-xen3 fallback handlers (bsc#1065600).\n- xfs: remove filestream item xfs_inode reference (bsc#1127961).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2019-801,SUSE-SLE-DESKTOP-12-SP3-2019-801,SUSE-SLE-HA-12-SP3-2019-801,SUSE-SLE-Live-Patching-12-SP3-2019-801,SUSE-SLE-SDK-12-SP3-2019-801,SUSE-SLE-SERVER-12-SP3-2019-801,SUSE-SLE-WE-12-SP3-2019-801",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2019_0801-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2019:0801-1",
        "url": "https://www.suse.com/support/update/announcement/2019/suse-su-20190801-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2019:0801-1",
        "url": "https://lists.suse.com/pipermail/sle-security-updates/2019-March/005261.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1012382",
        "url": "https://bugzilla.suse.com/1012382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1020413",
        "url": "https://bugzilla.suse.com/1020413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065600",
        "url": "https://bugzilla.suse.com/1065600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1070767",
        "url": "https://bugzilla.suse.com/1070767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1075697",
        "url": "https://bugzilla.suse.com/1075697"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1082943",
        "url": "https://bugzilla.suse.com/1082943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1087092",
        "url": "https://bugzilla.suse.com/1087092"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1090435",
        "url": "https://bugzilla.suse.com/1090435"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1102959",
        "url": "https://bugzilla.suse.com/1102959"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1103429",
        "url": "https://bugzilla.suse.com/1103429"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1106929",
        "url": "https://bugzilla.suse.com/1106929"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109137",
        "url": "https://bugzilla.suse.com/1109137"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1109248",
        "url": "https://bugzilla.suse.com/1109248"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1119019",
        "url": "https://bugzilla.suse.com/1119019"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1119843",
        "url": "https://bugzilla.suse.com/1119843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120691",
        "url": "https://bugzilla.suse.com/1120691"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1120902",
        "url": "https://bugzilla.suse.com/1120902"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1121713",
        "url": "https://bugzilla.suse.com/1121713"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1121805",
        "url": "https://bugzilla.suse.com/1121805"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1124235",
        "url": "https://bugzilla.suse.com/1124235"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1125315",
        "url": "https://bugzilla.suse.com/1125315"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1125446",
        "url": "https://bugzilla.suse.com/1125446"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126389",
        "url": "https://bugzilla.suse.com/1126389"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126772",
        "url": "https://bugzilla.suse.com/1126772"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126773",
        "url": "https://bugzilla.suse.com/1126773"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1126805",
        "url": "https://bugzilla.suse.com/1126805"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127082",
        "url": "https://bugzilla.suse.com/1127082"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127155",
        "url": "https://bugzilla.suse.com/1127155"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127561",
        "url": "https://bugzilla.suse.com/1127561"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127725",
        "url": "https://bugzilla.suse.com/1127725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127731",
        "url": "https://bugzilla.suse.com/1127731"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1127961",
        "url": "https://bugzilla.suse.com/1127961"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1128166",
        "url": "https://bugzilla.suse.com/1128166"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1128452",
        "url": "https://bugzilla.suse.com/1128452"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1128565",
        "url": "https://bugzilla.suse.com/1128565"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1128696",
        "url": "https://bugzilla.suse.com/1128696"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1128756",
        "url": "https://bugzilla.suse.com/1128756"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1128893",
        "url": "https://bugzilla.suse.com/1128893"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129080",
        "url": "https://bugzilla.suse.com/1129080"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129179",
        "url": "https://bugzilla.suse.com/1129179"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129237",
        "url": "https://bugzilla.suse.com/1129237"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129238",
        "url": "https://bugzilla.suse.com/1129238"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129239",
        "url": "https://bugzilla.suse.com/1129239"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129240",
        "url": "https://bugzilla.suse.com/1129240"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129241",
        "url": "https://bugzilla.suse.com/1129241"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129413",
        "url": "https://bugzilla.suse.com/1129413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129414",
        "url": "https://bugzilla.suse.com/1129414"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129415",
        "url": "https://bugzilla.suse.com/1129415"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129416",
        "url": "https://bugzilla.suse.com/1129416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129417",
        "url": "https://bugzilla.suse.com/1129417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129418",
        "url": "https://bugzilla.suse.com/1129418"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129419",
        "url": "https://bugzilla.suse.com/1129419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129581",
        "url": "https://bugzilla.suse.com/1129581"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129770",
        "url": "https://bugzilla.suse.com/1129770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129923",
        "url": "https://bugzilla.suse.com/1129923"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-2024 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-2024/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2019-9213 page",
        "url": "https://www.suse.com/security/cve/CVE-2019-9213/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2019-03-29T06:09:20Z",
      "generator": {
        "date": "2019-03-29T06:09:20Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2019:0801-1",
      "initial_release_date": "2019-03-29T06:09:20Z",
      "revision_history": [
        {
          "date": "2019-03-29T06:09:20Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.176-94.88.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.4.176-94.88.1.aarch64",
                  "product_id": "dlm-kmp-default-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.4.176-94.88.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-default-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-default-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-default-base-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-default-devel-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-default-extra-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-obs-build-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-obs-qa-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-syms-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-vanilla-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.176-94.88.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.4.176-94.88.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.4.176-94.88.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.176-94.88.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.176-94.88.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.4.176-94.88.1.noarch",
                "product": {
                  "name": "kernel-devel-4.4.176-94.88.1.noarch",
                  "product_id": "kernel-devel-4.4.176-94.88.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.4.176-94.88.1.noarch",
                "product": {
                  "name": "kernel-docs-4.4.176-94.88.1.noarch",
                  "product_id": "kernel-docs-4.4.176-94.88.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.4.176-94.88.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.4.176-94.88.1.noarch",
                  "product_id": "kernel-docs-html-4.4.176-94.88.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-pdf-4.4.176-94.88.1.noarch",
                "product": {
                  "name": "kernel-docs-pdf-4.4.176-94.88.1.noarch",
                  "product_id": "kernel-docs-pdf-4.4.176-94.88.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.4.176-94.88.1.noarch",
                "product": {
                  "name": "kernel-macros-4.4.176-94.88.1.noarch",
                  "product_id": "kernel-macros-4.4.176-94.88.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.4.176-94.88.1.noarch",
                "product": {
                  "name": "kernel-source-4.4.176-94.88.1.noarch",
                  "product_id": "kernel-source-4.4.176-94.88.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.4.176-94.88.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.4.176-94.88.1.noarch",
                  "product_id": "kernel-source-vanilla-4.4.176-94.88.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-debug-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-debug-4.4.176-94.88.1.ppc64le",
                  "product_id": "cluster-md-kmp-debug-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-debug-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-debug-4.4.176-94.88.1.ppc64le",
                  "product_id": "dlm-kmp-debug-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.4.176-94.88.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-debug-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-debug-4.4.176-94.88.1.ppc64le",
                  "product_id": "gfs2-kmp-debug-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-debug-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-debug-base-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-extra-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-debug-extra-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-debug-extra-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-debug-kgraft-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-debug-kgraft-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-default-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-default-base-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-default-devel-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-default-extra-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-obs-build-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-syms-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-vanilla-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.176-94.88.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
                  "product_id": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-debug-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-debug-4.4.176-94.88.1.ppc64le",
                  "product_id": "kselftests-kmp-debug-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.4.176-94.88.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-debug-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-debug-4.4.176-94.88.1.ppc64le",
                  "product_id": "ocfs2-kmp-debug-4.4.176-94.88.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.176-94.88.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.4.176-94.88.1.s390x",
                  "product_id": "dlm-kmp-default-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.4.176-94.88.1.s390x",
                  "product_id": "gfs2-kmp-default-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-default-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-default-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-default-base-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-default-devel-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-default-extra-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-default-kgraft-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-default-man-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-obs-build-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-obs-qa-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-syms-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-syms-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-vanilla-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-vanilla-base-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.4.176-94.88.1.s390x",
                  "product_id": "kernel-zfcpdump-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.4.176-94.88.1.s390x",
                  "product_id": "kselftests-kmp-default-4.4.176-94.88.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.176-94.88.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.176-94.88.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-debug-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-debug-4.4.176-94.88.1.x86_64",
                  "product_id": "cluster-md-kmp-debug-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-debug-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "dlm-kmp-debug-4.4.176-94.88.1.x86_64",
                  "product_id": "dlm-kmp-debug-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.4.176-94.88.1.x86_64",
                  "product_id": "dlm-kmp-default-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-debug-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-debug-4.4.176-94.88.1.x86_64",
                  "product_id": "gfs2-kmp-debug-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.4.176-94.88.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-debug-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-debug-base-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-debug-devel-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-extra-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-debug-extra-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-debug-extra-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-kgraft-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-debug-kgraft-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-debug-kgraft-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-default-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-default-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-default-base-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-default-devel-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-default-extra-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-obs-build-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-obs-qa-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-syms-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-vanilla-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.4.176-94.88.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
                  "product_id": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-debug-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-debug-4.4.176-94.88.1.x86_64",
                  "product_id": "kselftests-kmp-debug-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.4.176-94.88.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-debug-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-debug-4.4.176-94.88.1.x86_64",
                  "product_id": "ocfs2-kmp-debug-4.4.176-94.88.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Desktop 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Desktop 12 SP3",
                  "product_id": "SUSE Linux Enterprise Desktop 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sled:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                  "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-ha:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP3",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                  "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-sdk:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles_sap:12:sp3"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
                "product": {
                  "name": "SUSE Linux Enterprise Workstation Extension 12 SP3",
                  "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-we:12:sp3"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-source-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Desktop 12 SP3",
          "product_id": "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Desktop 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise High Availability Extension 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP3",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-docs-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-docs-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-obs-build-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-obs-build-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-obs-build-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-obs-build-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP3",
          "product_id": "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-obs-build-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-man-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-source-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP3",
          "product_id": "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-default-man-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-devel-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-macros-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.4.176-94.88.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch"
        },
        "product_reference": "kernel-source-4.4.176-94.88.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP3",
          "product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-syms-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP3"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-extra-4.4.176-94.88.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP3",
          "product_id": "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
        },
        "product_reference": "kernel-default-extra-4.4.176-94.88.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Workstation Extension 12 SP3"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2019-2024",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-2024"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In em28xx_unregister_dvb of em28xx-dvb.c, there is a possible use after free issue. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-111761954References: Upstream kernel",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-2024",
          "url": "https://www.suse.com/security/cve/CVE-2019-2024"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129179 for CVE-2019-2024",
          "url": "https://bugzilla.suse.com/1129179"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-03-29T06:09:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-2024"
    },
    {
      "cve": "CVE-2019-9213",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2019-9213"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x",
          "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64",
          "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2019-9213",
          "url": "https://www.suse.com/security/cve/CVE-2019-9213"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1128166 for CVE-2019-9213",
          "url": "https://bugzilla.suse.com/1128166"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1128378 for CVE-2019-9213",
          "url": "https://bugzilla.suse.com/1128378"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1129016 for CVE-2019-9213",
          "url": "https://bugzilla.suse.com/1129016"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.0"
          },
          "products": [
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Desktop 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:cluster-md-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:dlm-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:gfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise High Availability Extension 12 SP3:ocfs2-kmp-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP3:kgraft-patch-4_4_176-94_88-default-1-4.9.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-base-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-devel-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-default-man-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-devel-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-macros-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-source-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Server for SAP Applications 12 SP3:kernel-syms-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-docs-4.4.176-94.88.1.noarch",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.aarch64",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.ppc64le",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.s390x",
            "SUSE Linux Enterprise Software Development Kit 12 SP3:kernel-obs-build-4.4.176-94.88.1.x86_64",
            "SUSE Linux Enterprise Workstation Extension 12 SP3:kernel-default-extra-4.4.176-94.88.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2019-03-29T06:09:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2019-9213"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…