suse-su-2025:1293-1
Vulnerability from csaf_suse
Published
2025-04-16 07:51
Modified
2025-04-16 07:51
Summary
Security update for the Linux Kernel

Notes

Title of the patch
Security update for the Linux Kernel
Description of the patch
The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes. The following security bugs were fixed: - CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466). - CVE-2021-47645: media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (bsc#1237767). - CVE-2021-47648: gpu: host1x: Fix a memory leak in 'host1x_remove()' (bsc#1237725). - CVE-2022-49046: i2c: dev: check return value when calling dev_set_name() (bsc#1237842). - CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903). - CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918). - CVE-2022-49059: nfc: nci: add flush_workqueue to prevent uaf (bsc#1238007). - CVE-2022-49074: irqchip/gic-v3: Fix GICR_CTLR.RWP polling (bsc#1237728). - CVE-2022-49075: btrfs: fix qgroup reserve overflow the qgroup limit (bsc#1237733). - CVE-2022-49084: qede: confirm skb is allocated before using (bsc#1237751). - CVE-2022-49107: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1237973). - CVE-2022-49109: ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1237836). - CVE-2022-49119: scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() (bsc#1237925). - CVE-2022-49120: scsi: pm8001: Fix task leak in pm8001_send_abort_all() (bsc#1237969). - CVE-2022-49209: bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full (bsc#1238252). - CVE-2022-49220: dax: make sure inodes are flushed before destroy cache (bsc#1237936). - CVE-2022-49275: can: m_can: m_can_tx_handler(): fix use after free of skb (bsc#1238719). - CVE-2022-49286: tpm: use try_get_ops() in tpm-space.c (bsc#1238647). - CVE-2022-49292: ALSA: oss: Fix PCM OSS buffer allocation overflow (bsc#1238625). - CVE-2022-49308: extcon: Modify extcon device to be created after driver data is set (bsc#1238654). - CVE-2022-49331: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (bsc#1237813). - CVE-2022-49344: af_unix: Fix a data-race in unix_dgram_peer_wake_me() (bsc#1237988). - CVE-2022-49367: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (bsc#1238447). - CVE-2022-49370: firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (bsc#1238467). - CVE-2022-49372: tcp: tcp_rtx_synack() can be called from process context (bsc#1238251). - CVE-2022-49388: ubi: ubi_create_volume: Fix use-after-free when volume creation failed (bsc#1237934). - CVE-2022-49395: um: Fix out-of-bounds read in LDT setup (bsc#1237953). - CVE-2022-49397: phy: qcom-qmp: fix struct clk leak on probe errors (bsc#1237823). - CVE-2022-49404: RDMA/hfi1: Fix potential integer multiplication overflow errors (bsc#1238430). - CVE-2022-49416: wifi: mac80211: fix use-after-free in chanctx code (bsc#1238293). - CVE-2022-49433: RDMA/hfi1: Prevent use of lock before it is initialized (bsc#1238268). - CVE-2022-49472: net: phy: micrel: Allow probing without .driver_data (bsc#1238951). - CVE-2022-49488: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock (bsc#1238600). - CVE-2022-49495: drm/msm/hdmi: check return value after calling platform_get_resource_byname() (bsc#1237932). - CVE-2022-49497: net: remove two BUG() from skb_checksum_help() (bsc#1238946). - CVE-2022-49505: NFC: NULL out the dev->rfkill to prevent UAF (bsc#1238615). - CVE-2022-49516: ice: always check VF VSI pointer values (bsc#1238953). - CVE-2022-49519: ath10k: skip ath10k_halt during suspend for driver state RESTARTING (bsc#1238943). - CVE-2022-49524: media: pci: cx23885: Fix the error handling in cx23885_initdev() (bsc#1238949). - CVE-2022-49530: drm/amd/pm: fix double free in si_parse_power_table() (bsc#1238944). - CVE-2022-49538: ALSA: jack: Fix mutex call in snd_jack_report() (bsc#1238843). - CVE-2022-49544: ipw2x00: Fix potential NULL dereference in libipw_xmit() (bsc#1238721). - CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729). - CVE-2022-49546: x86/kexec: Fix double-free of elf header buffer (bsc#1238750). - CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787). - CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789). - CVE-2022-49578: ip: Fix data-races around sysctl_ip_prot_sock. (bsc#1238794). - CVE-2022-49581: be2net: Fix buffer overflow in be_get_module_eeprom (bsc#1238540). - CVE-2022-49589: kABI: protect mr_ifc_count change (bsc#1238598). - CVE-2022-49605: igc: Reinstate IGC_REMOVED logic and implement it properly (bsc#1238433). - CVE-2022-49607: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (bsc#1238817). - CVE-2022-49610: KVM: VMX: Prevent RSB underflow before vmenter (bsc#1238952). - CVE-2022-49619: net: sfp: fix memory leak in sfp_probe() (bsc#1239003). - CVE-2022-49620: net: tipc: fix possible refcount leak in tipc_sk_create() (bsc#1239002). - CVE-2022-49640: sysctl: Fix data races in proc_douintvec_minmax() (bsc#1237782). - CVE-2022-49641: sysctl: Fix data races in proc_douintvec() (bsc#1237831). - CVE-2022-49667: net: bonding: fix use-after-free after 802.3ad slave unbind (bsc#1238282). - CVE-2022-49672: net: tun: unlink NAPI from device on destruction (bsc#1238816). - CVE-2022-49711: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (bsc#1238416). - CVE-2022-49727: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg (bsc#1239059). - CVE-2022-49740: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads (bsc#1240233). - CVE-2023-52935: mm/khugepaged: fix ->anon_vma race (bsc#1240276). - CVE-2023-52997: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() (bsc#1240303). - CVE-2023-53010: bnxt: Do not read past the end of test names (bsc#1240290). - CVE-2023-53019: net: mdio: validate parameter addr in mdiobus_get_phy() (bsc#1240286). - CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489). - CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130). - CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785). - CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858). - CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733). - CVE-2024-49935: ACPI: PAD: fix crash in exit_round_robin() (bsc#1232370). - CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812). - CVE-2024-50269: usb: musb: sunxi: Fix accessing an released usb phy (bsc#1233458). - CVE-2024-53124: net: fix data-races around sk->sk_forward_alloc (bsc#1234074). - CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222). - CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715). - CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436). - CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637). - CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973). - CVE-2024-57973: rdma/cxgb4: Prevent potential integer overflow on 32bit (bsc#1238531). - CVE-2024-57979: kABI workaround for pps changes (bsc#1238521). - CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076). - CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109). - CVE-2024-58052: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (bsc#1238986). - CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970) - CVE-2024-58072: wifi: rtlwifi: remove unused check_buddy_priv (bsc#1238964). - CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036). - CVE-2025-21703: netem: Update sch->q.qlen before qdisc_tree_reduce_backlog() (bsc#1237313). - CVE-2025-21708: net: usb: rtl8150: enable basic endpoint checking (bsc#1239087). - CVE-2025-21744: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (bsc#1238903). - CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738). - CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763). - CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780). - CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897). - CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906). - CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754). - CVE-2025-21776: USB: hub: Ignore non-compliant devices with too many configs or interfaces (bsc#1238909). - CVE-2025-21782: orangefs: fix a oob in orangefs_debug_write (bsc#1239117). - CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747). - CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512). - CVE-2025-21796: nfsd: clear acl_access/acl_default after releasing them (bsc#1238716). - CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751). - CVE-2025-21821: fbdev: omap: use threaded IRQ for LCD DMA (bsc#1239174). - CVE-2025-21831: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (bsc#1239039). - CVE-2025-21846: acct: perform last write from workqueue (bsc#1239508). - CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479). - CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481). - CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183). - CVE-2025-21877: usbnet: gl620a: fix endpoint checking in genelink_bind() (bsc#1240172). - CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186). - CVE-2025-21916: usb: atm: cxacru: fix a flaw in existing endpoint checks (bsc#1240582). - CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639). - CVE-2025-21934: rapidio: fix an API misues when rio_add_net() fails (bsc#1240708). - CVE-2025-21935: rapidio: add check for rio_add_net() in rio_scan_alloc_net() (bsc#1240700). - CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784). - CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797). - CVE-2025-21996: drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (bsc#1240801). - CVE-2025-22007: Bluetooth: Fix error code in chan_alloc_skb_cb() (bsc#1240582). The following non-security bugs were fixed: - ceph: fix up error handling with snapdirs (bsc#1237836) - cpufreq: governor: Use kobject release() method to free dbs_data (bsc#1237800). - firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (bsc#1238467) - gro_cells: Avoid packet re-ordering for cloned skbs (bsc#1226323). - ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994). - ipv4: use RCU protection in inet_select_addr() (bsc#1239994). - ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994). - ipv4: use RCU protection in rt_is_expired() (bsc#1239994). - ipv6: icmp: convert to dev_net_rcu() (bsc#1239994). - ipv6: Use RCU in ip6_input() (bsc#1239994). - kernel/sysctl.c: define minmax conv functions in terms of non-minmax versions (bsc#1237782) - ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994). - ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994). - net: add dev_net_rcu() helper (bsc#1239994). - net: fix SO_REUSEPORT return code (bsc#1239448) - net: mana: Support holes in device list reply msg (bsc#1240133). - net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu() (bsc#1239994). - net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480). - pipe, sysctl: drop 'min' parameter from pipe-max-size converter (bsc#1237782) - pipe, sysctl: remove pipe_proc_fn() (bsc#1237782) - pipe: add proc_dopipe_max_size() to safely assign pipe_max_size (bsc#1237782) - pipe: reject F_SETPIPE_SZ with size over UINT_MAX (bsc#1237782) - scripts: fix incorrect regex escape With Tumbleweed's recent switch to Python 3.13 - sysctl: check for UINT_MAX before unsigned int min/max (bsc#1237782) - team: add ethtool get_link_ksettings (bsc#1228909).
Patchnames
SUSE-2025-1293,SUSE-SLE-Live-Patching-12-SP5-2025-1293,SUSE-SLE-SERVER-12-SP5-LTSS-2025-1293,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1293
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).



{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for the Linux Kernel",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "\nThe SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security bugfixes.\n\nThe following security bugs were fixed:\n\n- CVE-2021-46925: Fixed kernel panic caused by race of smc_sock (bsc#1220466).\n- CVE-2021-47645: media: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com (bsc#1237767).\n- CVE-2021-47648: gpu: host1x: Fix a memory leak in \u0027host1x_remove()\u0027 (bsc#1237725).\n- CVE-2022-49046: i2c: dev: check return value when calling dev_set_name() (bsc#1237842).\n- CVE-2022-49051: net: usb: aqc111: Fix out-of-bounds accesses in RX fixup (bsc#1237903).\n- CVE-2022-49053: scsi: target: tcmu: Fix possible page UAF (bsc#1237918).\n- CVE-2022-49059: nfc: nci: add flush_workqueue to prevent uaf (bsc#1238007).\n- CVE-2022-49074: irqchip/gic-v3: Fix GICR_CTLR.RWP polling (bsc#1237728).\n- CVE-2022-49075: btrfs: fix qgroup reserve overflow the qgroup limit (bsc#1237733).\n- CVE-2022-49084: qede: confirm skb is allocated before using (bsc#1237751).\n- CVE-2022-49107: ceph: fix memory leak in ceph_readdir when note_last_dentry returns error (bsc#1237973).\n- CVE-2022-49109: ceph: fix inode reference leakage in ceph_get_snapdir() (bsc#1237836).\n- CVE-2022-49119: scsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req() (bsc#1237925).\n- CVE-2022-49120: scsi: pm8001: Fix task leak in pm8001_send_abort_all() (bsc#1237969).\n- CVE-2022-49209: bpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full (bsc#1238252).\n- CVE-2022-49220: dax: make sure inodes are flushed before destroy cache (bsc#1237936).\n- CVE-2022-49275: can: m_can: m_can_tx_handler(): fix use after free of skb (bsc#1238719).\n- CVE-2022-49286: tpm: use try_get_ops() in tpm-space.c (bsc#1238647).\n- CVE-2022-49292: ALSA: oss: Fix PCM OSS buffer allocation overflow (bsc#1238625).\n- CVE-2022-49308: extcon: Modify extcon device to be created after driver data is set (bsc#1238654).\n- CVE-2022-49331: nfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling (bsc#1237813).\n- CVE-2022-49344: af_unix: Fix a data-race in unix_dgram_peer_wake_me() (bsc#1237988).\n- CVE-2022-49367: net: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register (bsc#1238447).\n- CVE-2022-49370: firmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle (bsc#1238467).\n- CVE-2022-49372: tcp: tcp_rtx_synack() can be called from process context (bsc#1238251).\n- CVE-2022-49388: ubi: ubi_create_volume: Fix use-after-free when volume creation failed (bsc#1237934).\n- CVE-2022-49395: um: Fix out-of-bounds read in LDT setup (bsc#1237953).\n- CVE-2022-49397: phy: qcom-qmp: fix struct clk leak on probe errors (bsc#1237823).\n- CVE-2022-49404: RDMA/hfi1: Fix potential integer multiplication overflow errors (bsc#1238430).\n- CVE-2022-49416: wifi: mac80211: fix use-after-free in chanctx code (bsc#1238293).\n- CVE-2022-49433: RDMA/hfi1: Prevent use of lock before it is initialized (bsc#1238268).\n- CVE-2022-49472: net: phy: micrel: Allow probing without .driver_data (bsc#1238951).\n- CVE-2022-49488: drm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock (bsc#1238600).\n- CVE-2022-49495: drm/msm/hdmi: check return value after calling platform_get_resource_byname() (bsc#1237932).\n- CVE-2022-49497: net: remove two BUG() from skb_checksum_help() (bsc#1238946).\n- CVE-2022-49505: NFC: NULL out the dev-\u003erfkill to prevent UAF (bsc#1238615).\n- CVE-2022-49516: ice: always check VF VSI pointer values (bsc#1238953).\n- CVE-2022-49519: ath10k: skip ath10k_halt during suspend for driver state RESTARTING (bsc#1238943).\n- CVE-2022-49524: media: pci: cx23885: Fix the error handling in cx23885_initdev() (bsc#1238949).\n- CVE-2022-49530: drm/amd/pm: fix double free in si_parse_power_table() (bsc#1238944).\n- CVE-2022-49538: ALSA: jack: Fix mutex call in snd_jack_report() (bsc#1238843).\n- CVE-2022-49544: ipw2x00: Fix potential NULL dereference in libipw_xmit() (bsc#1238721).\n- CVE-2022-49545: ALSA: usb-audio: Cancel pending work at closing a MIDI substream (bsc#1238729).\n- CVE-2022-49546: x86/kexec: Fix double-free of elf header buffer (bsc#1238750).\n- CVE-2022-49563: crypto: qat - add param check for RSA (bsc#1238787).\n- CVE-2022-49564: crypto: qat - add param check for DH (bsc#1238789).\n- CVE-2022-49578: ip: Fix data-races around sysctl_ip_prot_sock. (bsc#1238794).\n- CVE-2022-49581: be2net: Fix buffer overflow in be_get_module_eeprom (bsc#1238540).\n- CVE-2022-49589: kABI: protect mr_ifc_count change (bsc#1238598).\n- CVE-2022-49605: igc: Reinstate IGC_REMOVED logic and implement it properly (bsc#1238433).\n- CVE-2022-49607: perf/core: Fix data race between perf_event_set_output() and perf_mmap_close() (bsc#1238817).\n- CVE-2022-49610: KVM: VMX: Prevent RSB underflow before vmenter (bsc#1238952).\n- CVE-2022-49619: net: sfp: fix memory leak in sfp_probe() (bsc#1239003).\n- CVE-2022-49620: net: tipc: fix possible refcount leak in tipc_sk_create() (bsc#1239002).\n- CVE-2022-49640: sysctl: Fix data races in proc_douintvec_minmax() (bsc#1237782).\n- CVE-2022-49641: sysctl: Fix data races in proc_douintvec() (bsc#1237831).\n- CVE-2022-49667: net: bonding: fix use-after-free after 802.3ad slave unbind (bsc#1238282).\n- CVE-2022-49672: net: tun: unlink NAPI from device on destruction (bsc#1238816).\n- CVE-2022-49711: bus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove() (bsc#1238416).\n- CVE-2022-49727: ipv6: Fix signed integer overflow in l2tp_ip6_sendmsg (bsc#1239059).\n- CVE-2022-49740: wifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads (bsc#1240233).\n- CVE-2023-52935: mm/khugepaged: fix -\u003eanon_vma race (bsc#1240276).\n- CVE-2023-52997: ipv4: prevent potential spectre v1 gadget in ip_metrics_convert() (bsc#1240303).\n- CVE-2023-53010: bnxt: Do not read past the end of test names (bsc#1240290).\n- CVE-2023-53019: net: mdio: validate parameter addr in mdiobus_get_phy() (bsc#1240286).\n- CVE-2024-35910: kABI fix for tcp: properly terminate timers for kernel sockets (bsc#1224489).\n- CVE-2024-36968: Bluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init() (bsc#1226130).\n- CVE-2024-38559: scsi: qedf: Ensure the copied buf is NUL terminated (bsc#1226785).\n- CVE-2024-41005: netpoll: Fix race condition in netpoll_owner_active (bsc#1227858).\n- CVE-2024-49571: net/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg (bsc#1235733).\n- CVE-2024-49935: ACPI: PAD: fix crash in exit_round_robin() (bsc#1232370).\n- CVE-2024-49940: l2tp: prevent possible tunnel refcount underflow (bsc#1232812).\n- CVE-2024-50269: usb: musb: sunxi: Fix accessing an released usb phy (bsc#1233458).\n- CVE-2024-53124: net: fix data-races around sk-\u003esk_forward_alloc (bsc#1234074).\n- CVE-2024-53140: netlink: terminate outstanding dump on socket close (bsc#1234222).\n- CVE-2024-53680: ipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init() (bsc#1235715).\n- CVE-2024-56640: net/smc: fix LGR and link use-after-free issue (bsc#1235436).\n- CVE-2024-56770: net/sched: netem: account for backlog updates from child qdisc (bsc#1235637).\n- CVE-2024-57900: ila: serialize calls to nf_register_net_hooks() (bsc#1235973).\n- CVE-2024-57973: rdma/cxgb4: Prevent potential integer overflow on 32bit (bsc#1238531).\n- CVE-2024-57979: kABI workaround for pps changes (bsc#1238521).\n- CVE-2024-57996: net_sched: sch_sfq: do not allow 1 packet limit (bsc#1239076).\n- CVE-2024-58014: wifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy() (bsc#1239109).\n- CVE-2024-58052: drm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table (bsc#1238986).\n- CVE-2024-58071: team: prevent adding a device which is already a team device lower (bsc#1238970)\n- CVE-2024-58072: wifi: rtlwifi: remove unused check_buddy_priv (bsc#1238964).\n- CVE-2024-58083: KVM: Explicitly verify target vCPU is online in kvm_get_vcpu() (bsc#1239036).\n- CVE-2025-21703: netem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog() (bsc#1237313).\n- CVE-2025-21708: net: usb: rtl8150: enable basic endpoint checking (bsc#1239087).\n- CVE-2025-21744: wifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize() (bsc#1238903).\n- CVE-2025-21759: ipv6: mcast: extend RCU protection in igmp6_send() (bsc#1238738).\n- CVE-2025-21760: ndisc: extend RCU protection in ndisc_send_skb() (bsc#1238763).\n- CVE-2025-21762: arp: use RCU protection in arp_xmit() (bsc#1238780).\n- CVE-2025-21763: neighbour: use RCU protection in __neigh_notify() (bsc#1237897).\n- CVE-2025-21765: ipv6: use RCU protection in ip6_default_advmss() (bsc#1237906).\n- CVE-2025-21766: ipv4: use RCU protection in __ip_rt_update_pmtu() (bsc#1238754).\n- CVE-2025-21776: USB: hub: Ignore non-compliant devices with too many configs or interfaces (bsc#1238909).\n- CVE-2025-21782: orangefs: fix a oob in orangefs_debug_write (bsc#1239117).\n- CVE-2025-21785: arm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array (bsc#1238747).\n- CVE-2025-21791: vrf: use RCU protection in l3mdev_l3_out() (bsc#1238512).\n- CVE-2025-21796: nfsd: clear acl_access/acl_default after releasing them (bsc#1238716).\n- CVE-2025-21802: net: hns3: fix oops when unload drivers paralleling (bsc#1238751).\n- CVE-2025-21821: fbdev: omap: use threaded IRQ for LCD DMA (bsc#1239174).\n- CVE-2025-21831: PCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1 (bsc#1239039).\n- CVE-2025-21846: acct: perform last write from workqueue (bsc#1239508).\n- CVE-2025-21848: nfp: bpf: Add check for nfp_app_ctrl_msg_alloc() (bsc#1239479).\n- CVE-2025-21865: gtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl() (bsc#1239481).\n- CVE-2025-21871: tee: optee: Fix supplicant wait loop (bsc#1240183).\n- CVE-2025-21877: usbnet: gl620a: fix endpoint checking in genelink_bind() (bsc#1240172).\n- CVE-2025-21891: ipvlan: ensure network headers are in skb linear part (bsc#1240186).\n- CVE-2025-21916: usb: atm: cxacru: fix a flaw in existing endpoint checks (bsc#1240582).\n- CVE-2025-21922: ppp: Fix KMSAN uninit-value warning with bpf (bsc#1240639).\n- CVE-2025-21934: rapidio: fix an API misues when rio_add_net() fails (bsc#1240708).\n- CVE-2025-21935: rapidio: add check for rio_add_net() in rio_scan_alloc_net() (bsc#1240700).\n- CVE-2025-21969: Bluetooth: L2CAP: Fix build errors in some archs (bsc#1240784).\n- CVE-2025-21993: iscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic() (bsc#1240797).\n- CVE-2025-21996: drm/radeon: fix uninitialized size issue in radeon_vce_cs_parse() (bsc#1240801).\n- CVE-2025-22007: Bluetooth: Fix error code in chan_alloc_skb_cb() (bsc#1240582).\n\nThe following non-security bugs were fixed:\n\n- ceph: fix up error handling with snapdirs (bsc#1237836)\n- cpufreq: governor: Use kobject release() method to free dbs_data (bsc#1237800).\n- firmware: dmi-sysfs: Fix null-ptr-deref in dmi_sysfs_register_handle (bsc#1238467)\n- gro_cells: Avoid packet re-ordering for cloned skbs (bsc#1226323).\n- ipv4: add RCU protection to ip4_dst_hoplimit() (bsc#1239994).\n- ipv4: use RCU protection in inet_select_addr() (bsc#1239994).\n- ipv4: use RCU protection in ip_dst_mtu_maybe_forward() (bsc#1239994).\n- ipv4: use RCU protection in rt_is_expired() (bsc#1239994).\n- ipv6: icmp: convert to dev_net_rcu() (bsc#1239994).\n- ipv6: Use RCU in ip6_input() (bsc#1239994).\n- kernel/sysctl.c: define minmax conv functions in terms of non-minmax versions (bsc#1237782)\n- ndisc: ndisc_send_redirect() must use dev_get_by_index_rcu() (bsc#1239994).\n- ndisc: use RCU protection in ndisc_alloc_skb() (bsc#1239994).\n- net: add dev_net_rcu() helper (bsc#1239994).\n- net: fix SO_REUSEPORT return code (bsc#1239448)\n- net: mana: Support holes in device list reply msg (bsc#1240133).\n- net: treat possible_net_t net pointer as an RCU one and add read_pnet_rcu() (bsc#1239994).\n- net: usb: usbnet: restore usb%d name exception for local mac addresses (bsc#1234480).\n- pipe, sysctl: drop \u0027min\u0027 parameter from pipe-max-size converter (bsc#1237782)\n- pipe, sysctl: remove pipe_proc_fn() (bsc#1237782)\n- pipe: add proc_dopipe_max_size() to safely assign pipe_max_size (bsc#1237782)\n- pipe: reject F_SETPIPE_SZ with size over UINT_MAX (bsc#1237782)\n- scripts: fix incorrect regex escape With Tumbleweed\u0027s recent switch to Python 3.13 \n- sysctl: check for UINT_MAX before unsigned int min/max (bsc#1237782)\n- team: add ethtool get_link_ksettings (bsc#1228909).\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "SUSE-2025-1293,SUSE-SLE-Live-Patching-12-SP5-2025-1293,SUSE-SLE-SERVER-12-SP5-LTSS-2025-1293,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-1293",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_1293-1.json"
      },
      {
        "category": "self",
        "summary": "URL for SUSE-SU-2025:1293-1",
        "url": "https://www.suse.com/support/update/announcement/2025/suse-su-20251293-1/"
      },
      {
        "category": "self",
        "summary": "E-Mail link for SUSE-SU-2025:1293-1",
        "url": "https://lists.suse.com/pipermail/sle-updates/2025-April/039011.html"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1051510",
        "url": "https://bugzilla.suse.com/1051510"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1054914",
        "url": "https://bugzilla.suse.com/1054914"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1065729",
        "url": "https://bugzilla.suse.com/1065729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1129770",
        "url": "https://bugzilla.suse.com/1129770"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1190317",
        "url": "https://bugzilla.suse.com/1190317"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1195823",
        "url": "https://bugzilla.suse.com/1195823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197158",
        "url": "https://bugzilla.suse.com/1197158"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197227",
        "url": "https://bugzilla.suse.com/1197227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197331",
        "url": "https://bugzilla.suse.com/1197331"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1197661",
        "url": "https://bugzilla.suse.com/1197661"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198577",
        "url": "https://bugzilla.suse.com/1198577"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1198660",
        "url": "https://bugzilla.suse.com/1198660"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200571",
        "url": "https://bugzilla.suse.com/1200571"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200807",
        "url": "https://bugzilla.suse.com/1200807"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200809",
        "url": "https://bugzilla.suse.com/1200809"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200810",
        "url": "https://bugzilla.suse.com/1200810"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200871",
        "url": "https://bugzilla.suse.com/1200871"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1200872",
        "url": "https://bugzilla.suse.com/1200872"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201381",
        "url": "https://bugzilla.suse.com/1201381"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201610",
        "url": "https://bugzilla.suse.com/1201610"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1201726",
        "url": "https://bugzilla.suse.com/1201726"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202672",
        "url": "https://bugzilla.suse.com/1202672"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1202712",
        "url": "https://bugzilla.suse.com/1202712"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1203769",
        "url": "https://bugzilla.suse.com/1203769"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1207186",
        "url": "https://bugzilla.suse.com/1207186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1209547",
        "url": "https://bugzilla.suse.com/1209547"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1210647",
        "url": "https://bugzilla.suse.com/1210647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1213167",
        "url": "https://bugzilla.suse.com/1213167"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1218450",
        "url": "https://bugzilla.suse.com/1218450"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1220466",
        "url": "https://bugzilla.suse.com/1220466"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1224489",
        "url": "https://bugzilla.suse.com/1224489"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1225742",
        "url": "https://bugzilla.suse.com/1225742"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226130",
        "url": "https://bugzilla.suse.com/1226130"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226323",
        "url": "https://bugzilla.suse.com/1226323"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1226785",
        "url": "https://bugzilla.suse.com/1226785"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1227858",
        "url": "https://bugzilla.suse.com/1227858"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1228909",
        "url": "https://bugzilla.suse.com/1228909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231375",
        "url": "https://bugzilla.suse.com/1231375"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1231854",
        "url": "https://bugzilla.suse.com/1231854"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232370",
        "url": "https://bugzilla.suse.com/1232370"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1232812",
        "url": "https://bugzilla.suse.com/1232812"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1233458",
        "url": "https://bugzilla.suse.com/1233458"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1233479",
        "url": "https://bugzilla.suse.com/1233479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1233557",
        "url": "https://bugzilla.suse.com/1233557"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234074",
        "url": "https://bugzilla.suse.com/1234074"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234222",
        "url": "https://bugzilla.suse.com/1234222"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1234480",
        "url": "https://bugzilla.suse.com/1234480"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235436",
        "url": "https://bugzilla.suse.com/1235436"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235485",
        "url": "https://bugzilla.suse.com/1235485"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235637",
        "url": "https://bugzilla.suse.com/1235637"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235715",
        "url": "https://bugzilla.suse.com/1235715"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235733",
        "url": "https://bugzilla.suse.com/1235733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1235973",
        "url": "https://bugzilla.suse.com/1235973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237313",
        "url": "https://bugzilla.suse.com/1237313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237721",
        "url": "https://bugzilla.suse.com/1237721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237722",
        "url": "https://bugzilla.suse.com/1237722"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237725",
        "url": "https://bugzilla.suse.com/1237725"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237728",
        "url": "https://bugzilla.suse.com/1237728"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237733",
        "url": "https://bugzilla.suse.com/1237733"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237735",
        "url": "https://bugzilla.suse.com/1237735"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237739",
        "url": "https://bugzilla.suse.com/1237739"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237751",
        "url": "https://bugzilla.suse.com/1237751"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237752",
        "url": "https://bugzilla.suse.com/1237752"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237767",
        "url": "https://bugzilla.suse.com/1237767"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237768",
        "url": "https://bugzilla.suse.com/1237768"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237782",
        "url": "https://bugzilla.suse.com/1237782"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237800",
        "url": "https://bugzilla.suse.com/1237800"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237813",
        "url": "https://bugzilla.suse.com/1237813"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237814",
        "url": "https://bugzilla.suse.com/1237814"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237815",
        "url": "https://bugzilla.suse.com/1237815"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237823",
        "url": "https://bugzilla.suse.com/1237823"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237831",
        "url": "https://bugzilla.suse.com/1237831"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237836",
        "url": "https://bugzilla.suse.com/1237836"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237842",
        "url": "https://bugzilla.suse.com/1237842"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237897",
        "url": "https://bugzilla.suse.com/1237897"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237903",
        "url": "https://bugzilla.suse.com/1237903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237906",
        "url": "https://bugzilla.suse.com/1237906"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237918",
        "url": "https://bugzilla.suse.com/1237918"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237925",
        "url": "https://bugzilla.suse.com/1237925"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237932",
        "url": "https://bugzilla.suse.com/1237932"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237933",
        "url": "https://bugzilla.suse.com/1237933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237934",
        "url": "https://bugzilla.suse.com/1237934"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237936",
        "url": "https://bugzilla.suse.com/1237936"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237941",
        "url": "https://bugzilla.suse.com/1237941"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237953",
        "url": "https://bugzilla.suse.com/1237953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237969",
        "url": "https://bugzilla.suse.com/1237969"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237973",
        "url": "https://bugzilla.suse.com/1237973"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237983",
        "url": "https://bugzilla.suse.com/1237983"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1237988",
        "url": "https://bugzilla.suse.com/1237988"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238007",
        "url": "https://bugzilla.suse.com/1238007"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238030",
        "url": "https://bugzilla.suse.com/1238030"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238036",
        "url": "https://bugzilla.suse.com/1238036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238079",
        "url": "https://bugzilla.suse.com/1238079"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238108",
        "url": "https://bugzilla.suse.com/1238108"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238127",
        "url": "https://bugzilla.suse.com/1238127"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238133",
        "url": "https://bugzilla.suse.com/1238133"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238146",
        "url": "https://bugzilla.suse.com/1238146"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238168",
        "url": "https://bugzilla.suse.com/1238168"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238169",
        "url": "https://bugzilla.suse.com/1238169"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238170",
        "url": "https://bugzilla.suse.com/1238170"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238171",
        "url": "https://bugzilla.suse.com/1238171"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238172",
        "url": "https://bugzilla.suse.com/1238172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238180",
        "url": "https://bugzilla.suse.com/1238180"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238181",
        "url": "https://bugzilla.suse.com/1238181"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238183",
        "url": "https://bugzilla.suse.com/1238183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238231",
        "url": "https://bugzilla.suse.com/1238231"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238236",
        "url": "https://bugzilla.suse.com/1238236"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238240",
        "url": "https://bugzilla.suse.com/1238240"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238251",
        "url": "https://bugzilla.suse.com/1238251"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238252",
        "url": "https://bugzilla.suse.com/1238252"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238257",
        "url": "https://bugzilla.suse.com/1238257"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238266",
        "url": "https://bugzilla.suse.com/1238266"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238268",
        "url": "https://bugzilla.suse.com/1238268"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238269",
        "url": "https://bugzilla.suse.com/1238269"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238271",
        "url": "https://bugzilla.suse.com/1238271"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238272",
        "url": "https://bugzilla.suse.com/1238272"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238274",
        "url": "https://bugzilla.suse.com/1238274"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238276",
        "url": "https://bugzilla.suse.com/1238276"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238279",
        "url": "https://bugzilla.suse.com/1238279"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238282",
        "url": "https://bugzilla.suse.com/1238282"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238293",
        "url": "https://bugzilla.suse.com/1238293"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238313",
        "url": "https://bugzilla.suse.com/1238313"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238336",
        "url": "https://bugzilla.suse.com/1238336"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238372",
        "url": "https://bugzilla.suse.com/1238372"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238373",
        "url": "https://bugzilla.suse.com/1238373"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238376",
        "url": "https://bugzilla.suse.com/1238376"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238378",
        "url": "https://bugzilla.suse.com/1238378"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238382",
        "url": "https://bugzilla.suse.com/1238382"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238393",
        "url": "https://bugzilla.suse.com/1238393"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238396",
        "url": "https://bugzilla.suse.com/1238396"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238413",
        "url": "https://bugzilla.suse.com/1238413"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238416",
        "url": "https://bugzilla.suse.com/1238416"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238417",
        "url": "https://bugzilla.suse.com/1238417"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238419",
        "url": "https://bugzilla.suse.com/1238419"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238430",
        "url": "https://bugzilla.suse.com/1238430"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238433",
        "url": "https://bugzilla.suse.com/1238433"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238434",
        "url": "https://bugzilla.suse.com/1238434"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238443",
        "url": "https://bugzilla.suse.com/1238443"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238447",
        "url": "https://bugzilla.suse.com/1238447"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238454",
        "url": "https://bugzilla.suse.com/1238454"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238467",
        "url": "https://bugzilla.suse.com/1238467"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238469",
        "url": "https://bugzilla.suse.com/1238469"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238512",
        "url": "https://bugzilla.suse.com/1238512"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238521",
        "url": "https://bugzilla.suse.com/1238521"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238531",
        "url": "https://bugzilla.suse.com/1238531"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238540",
        "url": "https://bugzilla.suse.com/1238540"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238598",
        "url": "https://bugzilla.suse.com/1238598"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238599",
        "url": "https://bugzilla.suse.com/1238599"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238600",
        "url": "https://bugzilla.suse.com/1238600"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238612",
        "url": "https://bugzilla.suse.com/1238612"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238613",
        "url": "https://bugzilla.suse.com/1238613"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238615",
        "url": "https://bugzilla.suse.com/1238615"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238618",
        "url": "https://bugzilla.suse.com/1238618"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238623",
        "url": "https://bugzilla.suse.com/1238623"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238625",
        "url": "https://bugzilla.suse.com/1238625"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238626",
        "url": "https://bugzilla.suse.com/1238626"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238630",
        "url": "https://bugzilla.suse.com/1238630"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238633",
        "url": "https://bugzilla.suse.com/1238633"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238635",
        "url": "https://bugzilla.suse.com/1238635"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238647",
        "url": "https://bugzilla.suse.com/1238647"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238654",
        "url": "https://bugzilla.suse.com/1238654"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238705",
        "url": "https://bugzilla.suse.com/1238705"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238707",
        "url": "https://bugzilla.suse.com/1238707"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238710",
        "url": "https://bugzilla.suse.com/1238710"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238716",
        "url": "https://bugzilla.suse.com/1238716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238719",
        "url": "https://bugzilla.suse.com/1238719"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238721",
        "url": "https://bugzilla.suse.com/1238721"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238729",
        "url": "https://bugzilla.suse.com/1238729"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238738",
        "url": "https://bugzilla.suse.com/1238738"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238747",
        "url": "https://bugzilla.suse.com/1238747"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238750",
        "url": "https://bugzilla.suse.com/1238750"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238751",
        "url": "https://bugzilla.suse.com/1238751"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238754",
        "url": "https://bugzilla.suse.com/1238754"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238763",
        "url": "https://bugzilla.suse.com/1238763"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238780",
        "url": "https://bugzilla.suse.com/1238780"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238787",
        "url": "https://bugzilla.suse.com/1238787"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238789",
        "url": "https://bugzilla.suse.com/1238789"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238794",
        "url": "https://bugzilla.suse.com/1238794"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238805",
        "url": "https://bugzilla.suse.com/1238805"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238816",
        "url": "https://bugzilla.suse.com/1238816"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238817",
        "url": "https://bugzilla.suse.com/1238817"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238819",
        "url": "https://bugzilla.suse.com/1238819"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238843",
        "url": "https://bugzilla.suse.com/1238843"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238889",
        "url": "https://bugzilla.suse.com/1238889"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238903",
        "url": "https://bugzilla.suse.com/1238903"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238909",
        "url": "https://bugzilla.suse.com/1238909"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238916",
        "url": "https://bugzilla.suse.com/1238916"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238925",
        "url": "https://bugzilla.suse.com/1238925"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238933",
        "url": "https://bugzilla.suse.com/1238933"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238943",
        "url": "https://bugzilla.suse.com/1238943"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238944",
        "url": "https://bugzilla.suse.com/1238944"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238946",
        "url": "https://bugzilla.suse.com/1238946"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238949",
        "url": "https://bugzilla.suse.com/1238949"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238950",
        "url": "https://bugzilla.suse.com/1238950"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238951",
        "url": "https://bugzilla.suse.com/1238951"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238952",
        "url": "https://bugzilla.suse.com/1238952"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238953",
        "url": "https://bugzilla.suse.com/1238953"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238954",
        "url": "https://bugzilla.suse.com/1238954"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238964",
        "url": "https://bugzilla.suse.com/1238964"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238970",
        "url": "https://bugzilla.suse.com/1238970"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1238986",
        "url": "https://bugzilla.suse.com/1238986"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239002",
        "url": "https://bugzilla.suse.com/1239002"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239003",
        "url": "https://bugzilla.suse.com/1239003"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239035",
        "url": "https://bugzilla.suse.com/1239035"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239036",
        "url": "https://bugzilla.suse.com/1239036"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239039",
        "url": "https://bugzilla.suse.com/1239039"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239040",
        "url": "https://bugzilla.suse.com/1239040"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239041",
        "url": "https://bugzilla.suse.com/1239041"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239059",
        "url": "https://bugzilla.suse.com/1239059"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239076",
        "url": "https://bugzilla.suse.com/1239076"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239087",
        "url": "https://bugzilla.suse.com/1239087"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239109",
        "url": "https://bugzilla.suse.com/1239109"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239117",
        "url": "https://bugzilla.suse.com/1239117"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239174",
        "url": "https://bugzilla.suse.com/1239174"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239448",
        "url": "https://bugzilla.suse.com/1239448"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239454",
        "url": "https://bugzilla.suse.com/1239454"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239468",
        "url": "https://bugzilla.suse.com/1239468"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239479",
        "url": "https://bugzilla.suse.com/1239479"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239481",
        "url": "https://bugzilla.suse.com/1239481"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239484",
        "url": "https://bugzilla.suse.com/1239484"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239508",
        "url": "https://bugzilla.suse.com/1239508"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1239994",
        "url": "https://bugzilla.suse.com/1239994"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240133",
        "url": "https://bugzilla.suse.com/1240133"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240172",
        "url": "https://bugzilla.suse.com/1240172"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240183",
        "url": "https://bugzilla.suse.com/1240183"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240186",
        "url": "https://bugzilla.suse.com/1240186"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240208",
        "url": "https://bugzilla.suse.com/1240208"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240213",
        "url": "https://bugzilla.suse.com/1240213"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240218",
        "url": "https://bugzilla.suse.com/1240218"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240227",
        "url": "https://bugzilla.suse.com/1240227"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240229",
        "url": "https://bugzilla.suse.com/1240229"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240233",
        "url": "https://bugzilla.suse.com/1240233"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240272",
        "url": "https://bugzilla.suse.com/1240272"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240275",
        "url": "https://bugzilla.suse.com/1240275"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240276",
        "url": "https://bugzilla.suse.com/1240276"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240282",
        "url": "https://bugzilla.suse.com/1240282"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240285",
        "url": "https://bugzilla.suse.com/1240285"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240286",
        "url": "https://bugzilla.suse.com/1240286"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240288",
        "url": "https://bugzilla.suse.com/1240288"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240290",
        "url": "https://bugzilla.suse.com/1240290"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240303",
        "url": "https://bugzilla.suse.com/1240303"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240318",
        "url": "https://bugzilla.suse.com/1240318"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240582",
        "url": "https://bugzilla.suse.com/1240582"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240639",
        "url": "https://bugzilla.suse.com/1240639"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240700",
        "url": "https://bugzilla.suse.com/1240700"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240708",
        "url": "https://bugzilla.suse.com/1240708"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240784",
        "url": "https://bugzilla.suse.com/1240784"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240797",
        "url": "https://bugzilla.suse.com/1240797"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1240801",
        "url": "https://bugzilla.suse.com/1240801"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2017-5753 page",
        "url": "https://www.suse.com/security/cve/CVE-2017-5753/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-46925 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-46925/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47633 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47633/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47645 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47645/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47648 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47648/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2021-47652 page",
        "url": "https://www.suse.com/security/cve/CVE-2021-47652/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1016 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1016/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1048 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1048/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-1184 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-1184/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-26373 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-26373/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-2977 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-2977/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-3303 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-3303/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49046 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49046/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49051 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49051/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49053 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49053/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49058 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49058/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49059 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49059/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49065 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49065/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49066 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49066/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49074 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49074/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49075 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49075/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49084 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49084/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49085 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49085/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49095 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49095/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49098 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49098/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49100 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49100/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49107 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49107/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49109 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49109/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49114 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49114/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49119 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49119/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49120 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49120/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49122 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49122/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49155 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49155/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49156 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49156/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49157 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49157/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49158 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49158/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49159 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49159/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49160 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49160/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49164 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49164/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49191 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49191/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49196 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49196/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49204 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49204/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49209 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49209/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49217 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49217/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49220 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49220/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49226 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49226/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49259 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49259/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49264 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49264/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49271 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49271/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49272 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49272/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49275 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49275/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49280 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49280/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49281 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49281/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49286 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49286/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49287 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49287/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49288 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49288/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49291 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49291/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49292 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49292/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49293 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49293/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49295 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49295/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49297 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49297/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49300 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49300/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49308 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49308/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49313 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49313/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49321 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49321/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49322 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49322/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49330 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49330/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49331 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49331/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49332 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49332/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49337 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49337/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49343 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49343/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49344 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49344/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49347 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49347/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49349 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49349/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49367 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49367/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49370 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49370/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49372 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49372/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49388 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49388/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49389 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49389/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49395 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49395/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49397 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49397/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49404 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49404/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49407 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49407/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49409 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49409/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49413 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49413/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49414 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49414/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49416 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49416/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49421 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49421/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49429 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49429/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49432 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49432/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49433 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49433/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49434 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49434/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49437 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49437/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49443 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49443/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49444 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49444/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49472 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49472/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49488 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49488/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49492 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49492/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49495 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49495/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49497 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49497/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49505 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49505/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49513 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49513/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49516 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49516/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49519 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49519/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49524 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49524/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49526 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49526/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49530 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49530/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49532 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49532/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49538 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49538/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49544 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49544/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49545 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49545/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49546 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49546/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49555 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49555/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49563 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49563/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49564 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49564/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49566 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49566/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49578 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49578/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49581 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49581/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49584 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49584/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49589 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49589/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49605 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49605/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49607 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49607/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49610 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49610/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49611 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49611/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49619 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49619/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49620 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49620/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49623 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49623/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49638 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49638/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49640 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49641 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49641/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49647 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49647/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49649 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49649/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49657 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49657/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49667 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49667/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49672 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49672/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49673 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49673/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49674 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49674/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49687 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49687/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49707 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49707/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49708 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49708/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49710 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49710/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49711 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49711/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49713 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49713/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49727 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49727/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49733 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49733/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2022-49740 page",
        "url": "https://www.suse.com/security/cve/CVE-2022-49740/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-2162 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-2162/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-3567 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-3567/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52933 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52933/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52935 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52973 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52973/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52974 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52974/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52979 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52979/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-52997 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-52997/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53000 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53000/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53006 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53006/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53007 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53007/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53008 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53008/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53010 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53010/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53015 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53015/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53019 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53019/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53024 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53024/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2023-53031 page",
        "url": "https://www.suse.com/security/cve/CVE-2023-53031/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-35910 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-35910/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-36968 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-36968/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-38559 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-38559/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-41005 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-41005/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-47678 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-47678/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49571 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49571/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49935 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-49940 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-49940/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50269 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50269/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-50290 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-50290/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53063 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53063/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53124 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53124/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53140 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53140/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-53680 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-53680/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56633 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56633/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56640 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56640/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-56770 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-56770/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57900 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57900/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57973 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57973/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57979 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57979/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-57996 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-57996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-58014 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-58014/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-58052 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-58052/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-58071 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-58071/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-58072 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-58072/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2024-58083 page",
        "url": "https://www.suse.com/security/cve/CVE-2024-58083/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21703 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21703/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21708 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21708/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21744 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21744/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21759 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21759/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21760 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21760/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21762 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21762/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21763 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21763/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21765 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21765/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21766 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21766/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21776 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21776/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21782 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21782/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21785 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21785/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21791 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21791/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21796 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21796/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21802 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21802/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21821 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21821/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21831 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21831/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21846 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21846/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21848 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21848/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21855 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21855/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21858 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21858/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21865 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21865/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21871 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21871/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21877 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21877/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21891 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21891/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21916 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21916/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21922 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21922/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21934 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21934/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21935 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21935/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21969 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21969/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21993 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21993/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-21996 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-21996/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-22007 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-22007/"
      }
    ],
    "title": "Security update for the Linux Kernel",
    "tracking": {
      "current_release_date": "2025-04-16T07:51:20Z",
      "generator": {
        "date": "2025-04-16T07:51:20Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "SUSE-SU-2025:1293-1",
      "initial_release_date": "2025-04-16T07:51:20Z",
      "revision_history": [
        {
          "date": "2025-04-16T07:51:20Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.255.1.aarch64",
                  "product_id": "dlm-kmp-default-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.255.1.aarch64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-default-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-default-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-default-base-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-default-devel-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-default-extra-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-obs-build-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-obs-qa-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-syms-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-vanilla-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.255.1.aarch64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.255.1.aarch64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.255.1.aarch64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.255.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "kernel-devel-4.12.14-122.255.1.noarch",
                "product": {
                  "name": "kernel-devel-4.12.14-122.255.1.noarch",
                  "product_id": "kernel-devel-4.12.14-122.255.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-4.12.14-122.255.1.noarch",
                "product": {
                  "name": "kernel-docs-4.12.14-122.255.1.noarch",
                  "product_id": "kernel-docs-4.12.14-122.255.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-docs-html-4.12.14-122.255.1.noarch",
                "product": {
                  "name": "kernel-docs-html-4.12.14-122.255.1.noarch",
                  "product_id": "kernel-docs-html-4.12.14-122.255.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-macros-4.12.14-122.255.1.noarch",
                "product": {
                  "name": "kernel-macros-4.12.14-122.255.1.noarch",
                  "product_id": "kernel-macros-4.12.14-122.255.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-4.12.14-122.255.1.noarch",
                "product": {
                  "name": "kernel-source-4.12.14-122.255.1.noarch",
                  "product_id": "kernel-source-4.12.14-122.255.1.noarch"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-source-vanilla-4.12.14-122.255.1.noarch",
                "product": {
                  "name": "kernel-source-vanilla-4.12.14-122.255.1.noarch",
                  "product_id": "kernel-source-vanilla-4.12.14-122.255.1.noarch"
                }
              }
            ],
            "category": "architecture",
            "name": "noarch"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.255.1.ppc64le",
                  "product_id": "dlm-kmp-default-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
                  "product_id": "gfs2-kmp-default-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-debug-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-debug-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-debug-base-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-debug-devel-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-default-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-default-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-default-base-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-default-devel-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-default-extra-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-default-kgraft-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-obs-build-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-obs-qa-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-syms-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-syms-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-vanilla-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-vanilla-base-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.255.1.ppc64le",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
                  "product_id": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.255.1.ppc64le",
                  "product_id": "kselftests-kmp-default-4.12.14-122.255.1.ppc64le"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.255.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.255.1.s390x",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.255.1.s390x",
                  "product_id": "dlm-kmp-default-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.255.1.s390x",
                  "product_id": "gfs2-kmp-default-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-default-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-default-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-default-base-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-default-devel-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-default-extra-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-default-kgraft-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-man-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-default-man-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-default-man-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-obs-build-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-obs-qa-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-syms-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-syms-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-vanilla-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-vanilla-base-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-zfcpdump-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-zfcpdump-man-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kernel-zfcpdump-man-4.12.14-122.255.1.s390x",
                  "product_id": "kernel-zfcpdump-man-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
                  "product_id": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.255.1.s390x",
                  "product_id": "kselftests-kmp-default-4.12.14-122.255.1.s390x"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.255.1.s390x",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.255.1.s390x",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.255.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
                  "product_id": "cluster-md-kmp-default-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "dlm-kmp-default-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "dlm-kmp-default-4.12.14-122.255.1.x86_64",
                  "product_id": "dlm-kmp-default-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "gfs2-kmp-default-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "gfs2-kmp-default-4.12.14-122.255.1.x86_64",
                  "product_id": "gfs2-kmp-default-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-debug-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-debug-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-base-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-debug-base-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-debug-base-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-debug-devel-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-debug-devel-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-debug-devel-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-default-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-default-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-base-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-default-base-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-default-base-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-devel-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-default-devel-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-default-devel-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-extra-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-default-extra-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-default-extra-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-default-kgraft-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-kvmsmall-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-base-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-base-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-kvmsmall-base-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-kvmsmall-devel-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-kvmsmall-devel-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-kvmsmall-devel-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-build-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-obs-build-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-obs-build-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-obs-qa-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-obs-qa-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-obs-qa-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-syms-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-syms-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-syms-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-vanilla-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-base-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-base-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-vanilla-base-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kernel-vanilla-devel-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kernel-vanilla-devel-4.12.14-122.255.1.x86_64",
                  "product_id": "kernel-vanilla-devel-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
                "product": {
                  "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
                  "product_id": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "kselftests-kmp-default-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "kselftests-kmp-default-4.12.14-122.255.1.x86_64",
                  "product_id": "kselftests-kmp-default-4.12.14-122.255.1.x86_64"
                }
              },
              {
                "category": "product_version",
                "name": "ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
                "product": {
                  "name": "ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
                  "product_id": "ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_id": "SUSE Linux Enterprise Live Patching 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sle-live-patching:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                "product": {
                  "name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss:12:sp5"
                  }
                }
              },
              {
                "category": "product_name",
                "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                "product": {
                  "name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
                  "product_identification_helper": {
                    "cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
                  }
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le"
        },
        "product_reference": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x"
        },
        "product_reference": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5",
          "product_id": "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64"
        },
        "product_reference": "kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Live Patching 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "kernel-default-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "kernel-default-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x"
        },
        "product_reference": "kernel-default-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "kernel-default-base-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x"
        },
        "product_reference": "kernel-default-base-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-man-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x"
        },
        "product_reference": "kernel-default-man-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.255.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.255.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.255.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.255.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.255.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.255.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "kernel-syms-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "kernel-syms-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x"
        },
        "product_reference": "kernel-syms-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.255.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.255.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.255.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.255.1.s390x",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
          "product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "cluster-md-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "dlm-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "dlm-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "gfs2-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "gfs2-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-base-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-base-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-default-devel-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-default-devel-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-devel-4.12.14-122.255.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch"
        },
        "product_reference": "kernel-devel-4.12.14-122.255.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-macros-4.12.14-122.255.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch"
        },
        "product_reference": "kernel-macros-4.12.14-122.255.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-source-4.12.14-122.255.1.noarch as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch"
        },
        "product_reference": "kernel-source-4.12.14-122.255.1.noarch",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "kernel-syms-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "kernel-syms-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "ocfs2-kmp-default-4.12.14-122.255.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
          "product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        },
        "product_reference": "ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
        "relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2017-5753",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2017-5753"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Systems with microprocessors utilizing speculative execution and branch prediction may allow unauthorized disclosure of information to an attacker with local user access via a side-channel analysis.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2017-5753",
          "url": "https://www.suse.com/security/cve/CVE-2017-5753"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1068032 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1068032"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074562 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074562"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074578 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1074701 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1074701"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075006 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075419 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075419"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1075748 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1075748"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1080039 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1080039"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087084 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1087084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1087939 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1087939"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1089055 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1089055"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1136865 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1136865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1178658 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1178658"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201877 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1201877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209547 for CVE-2017-5753",
          "url": "https://bugzilla.suse.com/1209547"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2017-5753"
    },
    {
      "cve": "CVE-2021-46925",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-46925"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix kernel panic caused by race of smc_sock\n\nA crash occurs when smc_cdc_tx_handler() tries to access smc_sock\nbut smc_release() has already freed it.\n\n[ 4570.695099] BUG: unable to handle page fault for address: 000000002eae9e88\n[ 4570.696048] #PF: supervisor write access in kernel mode\n[ 4570.696728] #PF: error_code(0x0002) - not-present page\n[ 4570.697401] PGD 0 P4D 0\n[ 4570.697716] Oops: 0002 [#1] PREEMPT SMP NOPTI\n[ 4570.698228] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 5.16.0-rc4+ #111\n[ 4570.699013] Hardware name: Alibaba Cloud Alibaba Cloud ECS, BIOS 8c24b4c 04/0\n[ 4570.699933] RIP: 0010:_raw_spin_lock+0x1a/0x30\n\u003c...\u003e\n[ 4570.711446] Call Trace:\n[ 4570.711746]  \u003cIRQ\u003e\n[ 4570.711992]  smc_cdc_tx_handler+0x41/0xc0\n[ 4570.712470]  smc_wr_tx_tasklet_fn+0x213/0x560\n[ 4570.712981]  ? smc_cdc_tx_dismisser+0x10/0x10\n[ 4570.713489]  tasklet_action_common.isra.17+0x66/0x140\n[ 4570.714083]  __do_softirq+0x123/0x2f4\n[ 4570.714521]  irq_exit_rcu+0xc4/0xf0\n[ 4570.714934]  common_interrupt+0xba/0xe0\n\nThough smc_cdc_tx_handler() checked the existence of smc connection,\nsmc_release() may have already dismissed and released the smc socket\nbefore smc_cdc_tx_handler() further visits it.\n\nsmc_cdc_tx_handler()           |smc_release()\nif (!conn)                     |\n                               |\n                               |smc_cdc_tx_dismiss_slots()\n                               |      smc_cdc_tx_dismisser()\n                               |\n                               |sock_put(\u0026smc-\u003esk) \u003c- last sock_put,\n                               |                      smc_sock freed\nbh_lock_sock(\u0026smc-\u003esk) (panic) |\n\nTo make sure we won\u0027t receive any CDC messages after we free the\nsmc_sock, add a refcount on the smc_connection for inflight CDC\nmessage(posted to the QP but haven\u0027t received related CQE), and\ndon\u0027t release the smc_connection until all the inflight CDC messages\nhaven been done, for both success or failed ones.\n\nUsing refcount on CDC messages brings another problem: when the link\nis going to be destroyed, smcr_link_clear() will reset the QP, which\nthen remove all the pending CQEs related to the QP in the CQ. To make\nsure all the CQEs will always come back so the refcount on the\nsmc_connection can always reach 0, smc_ib_modify_qp_reset() was replaced\nby smc_ib_modify_qp_error().\nAnd remove the timeout in smc_wr_tx_wait_no_pending_sends() since we\nneed to wait for all pending WQEs done, or we may encounter use-after-\nfree when handling CQEs.\n\nFor IB device removal routine, we need to wait for all the QPs on that\ndevice been destroyed before we can destroy CQs on the device, or\nthe refcount on smc_connection won\u0027t reach 0 and smc_sock cannot be\nreleased.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-46925",
          "url": "https://www.suse.com/security/cve/CVE-2021-46925"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1220466 for CVE-2021-46925",
          "url": "https://bugzilla.suse.com/1220466"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-46925"
    },
    {
      "cve": "CVE-2021-47633",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47633"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath5k: fix OOB in ath5k_eeprom_read_pcal_info_5111\n\nThe bug was found during fuzzing. Stacktrace locates it in\nath5k_eeprom_convert_pcal_info_5111.\nWhen none of the curve is selected in the loop, idx can go\nup to AR5K_EEPROM_N_PD_CURVES. The line makes pd out of bound.\npd = \u0026chinfo[pier].pd_curves[idx];\n\nThere are many OOB writes using pd later in the code. So I\nadded a sanity check for idx. Checks for other loops involving\nAR5K_EEPROM_N_PD_CURVES are not needed as the loop index is not\nused outside the loops.\n\nThe patch is NOT tested with real device.\n\nThe following is the fuzzing report\n\nBUG: KASAN: slab-out-of-bounds in ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]\nWrite of size 1 at addr ffff8880174a4d60 by task modprobe/214\n\nCPU: 0 PID: 214 Comm: modprobe Not tainted 5.6.0 #1\nCall Trace:\n dump_stack+0x76/0xa0\n print_address_description.constprop.0+0x16/0x200\n ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]\n ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]\n __kasan_report.cold+0x37/0x7c\n ? ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]\n kasan_report+0xe/0x20\n ath5k_eeprom_read_pcal_info_5111+0x126a/0x1390 [ath5k]\n ? apic_timer_interrupt+0xa/0x20\n ? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k]\n ? ath5k_pci_eeprom_read+0x228/0x3c0 [ath5k]\n ath5k_eeprom_init+0x2513/0x6290 [ath5k]\n ? ath5k_eeprom_init_11a_pcal_freq+0xbc0/0xbc0 [ath5k]\n ? usleep_range+0xb8/0x100\n ? apic_timer_interrupt+0xa/0x20\n ? ath5k_eeprom_read_pcal_info_2413+0x2f20/0x2f20 [ath5k]\n ath5k_hw_init+0xb60/0x1970 [ath5k]\n ath5k_init_ah+0x6fe/0x2530 [ath5k]\n ? kasprintf+0xa6/0xe0\n ? ath5k_stop+0x140/0x140 [ath5k]\n ? _dev_notice+0xf6/0xf6\n ? apic_timer_interrupt+0xa/0x20\n ath5k_pci_probe.cold+0x29a/0x3d6 [ath5k]\n ? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k]\n ? mutex_lock+0x89/0xd0\n ? ath5k_pci_eeprom_read+0x3c0/0x3c0 [ath5k]\n local_pci_probe+0xd3/0x160\n pci_device_probe+0x23f/0x3e0\n ? pci_device_remove+0x280/0x280\n ? pci_device_remove+0x280/0x280\n really_probe+0x209/0x5d0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47633",
          "url": "https://www.suse.com/security/cve/CVE-2021-47633"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237768 for CVE-2021-47633",
          "url": "https://bugzilla.suse.com/1237768"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237769 for CVE-2021-47633",
          "url": "https://bugzilla.suse.com/1237769"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2021-47633"
    },
    {
      "cve": "CVE-2021-47645",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47645"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: staging: media: zoran: calculate the right buffer number for zoran_reap_stat_com\n\nOn the case tmp_dcim=1, the index of buffer is miscalculated.\nThis generate a NULL pointer dereference later.\n\nSo let\u0027s fix the calcul and add a check to prevent this to reappear.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47645",
          "url": "https://www.suse.com/security/cve/CVE-2021-47645"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237767 for CVE-2021-47645",
          "url": "https://bugzilla.suse.com/1237767"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47645"
    },
    {
      "cve": "CVE-2021-47648",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47648"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngpu: host1x: Fix a memory leak in \u0027host1x_remove()\u0027\n\nAdd a missing \u0027host1x_channel_list_free()\u0027 call in the remove function,\nas already done in the error handling path of the probe function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47648",
          "url": "https://www.suse.com/security/cve/CVE-2021-47648"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237725 for CVE-2021-47648",
          "url": "https://bugzilla.suse.com/1237725"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47648"
    },
    {
      "cve": "CVE-2021-47652",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2021-47652"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: smscufx: Fix null-ptr-deref in ufx_usb_probe()\n\nI got a null-ptr-deref report:\n\nBUG: kernel NULL pointer dereference, address: 0000000000000000\n...\nRIP: 0010:fb_destroy_modelist+0x38/0x100\n...\nCall Trace:\n ufx_usb_probe.cold+0x2b5/0xac1 [smscufx]\n usb_probe_interface+0x1aa/0x3c0 [usbcore]\n really_probe+0x167/0x460\n...\n ret_from_fork+0x1f/0x30\n\nIf fb_alloc_cmap() fails in ufx_usb_probe(), fb_destroy_modelist() will\nbe called to destroy modelist in the error handling path. But modelist\nhas not been initialized yet, so it will result in null-ptr-deref.\n\nInitialize modelist before calling fb_alloc_cmap() to fix this bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2021-47652",
          "url": "https://www.suse.com/security/cve/CVE-2021-47652"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237721 for CVE-2021-47652",
          "url": "https://bugzilla.suse.com/1237721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2021-47652"
    },
    {
      "cve": "CVE-2022-1016",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1016"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel in net/netfilter/nf_tables_core.c:nft_do_chain, which can cause a use-after-free. This issue needs to handle \u0027return\u0027 with proper preconditions, as it can lead to a kernel information leak problem caused by a local, unprivileged attacker.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1016",
          "url": "https://www.suse.com/security/cve/CVE-2022-1016"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197227 for CVE-2022-1016",
          "url": "https://bugzilla.suse.com/1197227"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197335 for CVE-2022-1016",
          "url": "https://bugzilla.suse.com/1197335"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1016"
    },
    {
      "cve": "CVE-2022-1048",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1048"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in the Linux kernel\u0027s sound subsystem in the way a user triggers concurrent calls of PCM hw_params. The hw_free ioctls or similar race condition happens inside ALSA PCM for other ioctls. This flaw allows a local user to crash or potentially escalate their privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1048",
          "url": "https://www.suse.com/security/cve/CVE-2022-1048"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197331 for CVE-2022-1048",
          "url": "https://bugzilla.suse.com/1197331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1197597 for CVE-2022-1048",
          "url": "https://bugzilla.suse.com/1197597"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1200041 for CVE-2022-1048",
          "url": "https://bugzilla.suse.com/1200041"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1204132 for CVE-2022-1048",
          "url": "https://bugzilla.suse.com/1204132"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212325 for CVE-2022-1048",
          "url": "https://bugzilla.suse.com/1212325"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-1048"
    },
    {
      "cve": "CVE-2022-1184",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-1184"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in fs/ext4/namei.c:dx_insert_block() in the Linux kernel\u0027s filesystem sub-component. This flaw allows a local attacker with a user privilege to cause a denial of service.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-1184",
          "url": "https://www.suse.com/security/cve/CVE-2022-1184"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1198577 for CVE-2022-1184",
          "url": "https://bugzilla.suse.com/1198577"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210859 for CVE-2022-1184",
          "url": "https://bugzilla.suse.com/1210859"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-1184"
    },
    {
      "cve": "CVE-2022-26373",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-26373"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "Non-transparent sharing of return predictor targets between contexts in some Intel(R) Processors may allow an authorized user to potentially enable information disclosure via local access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-26373",
          "url": "https://www.suse.com/security/cve/CVE-2022-26373"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1201726 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1201726"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1209619 for CVE-2022-26373",
          "url": "https://bugzilla.suse.com/1209619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-26373"
    },
    {
      "cve": "CVE-2022-2977",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-2977"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A flaw was found in the Linux kernel implementation of proxied virtualized TPM devices. On a system where virtualized TPM devices are configured (this is not the default) a local attacker can create a use-after-free and create a situation where it may be possible to escalate privileges on the system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-2977",
          "url": "https://www.suse.com/security/cve/CVE-2022-2977"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1202672 for CVE-2022-2977",
          "url": "https://bugzilla.suse.com/1202672"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.2,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-2977"
    },
    {
      "cve": "CVE-2022-3303",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-3303"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A race condition flaw was found in the Linux kernel sound subsystem due to improper locking. It could lead to a NULL pointer dereference while handling the SNDCTL_DSP_SYNC ioctl. A privileged local user (root or member of the audio group) could use this flaw to crash the system, resulting in a denial of service condition",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-3303",
          "url": "https://www.suse.com/security/cve/CVE-2022-3303"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1203769 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1203769"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1212304 for CVE-2022-3303",
          "url": "https://bugzilla.suse.com/1212304"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-3303"
    },
    {
      "cve": "CVE-2022-49046",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49046"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ni2c: dev: check return value when calling dev_set_name()\n\nIf dev_set_name() fails, the dev_name() is null, check the return\nvalue of dev_set_name() to avoid the null-ptr-deref.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49046",
          "url": "https://www.suse.com/security/cve/CVE-2022-49046"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237842 for CVE-2022-49046",
          "url": "https://bugzilla.suse.com/1237842"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49046"
    },
    {
      "cve": "CVE-2022-49051",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49051"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: aqc111: Fix out-of-bounds accesses in RX fixup\n\naqc111_rx_fixup() contains several out-of-bounds accesses that can be\ntriggered by a malicious (or defective) USB device, in particular:\n\n - The metadata array (desc_offset..desc_offset+2*pkt_count) can be out of bounds,\n   causing OOB reads and (on big-endian systems) OOB endianness flips.\n - A packet can overlap the metadata array, causing a later OOB\n   endianness flip to corrupt data used by a cloned SKB that has already\n   been handed off into the network stack.\n - A packet SKB can be constructed whose tail is far beyond its end,\n   causing out-of-bounds heap data to be considered part of the SKB\u0027s\n   data.\n\nFound doing variant analysis. Tested it with another driver (ax88179_178a), since\nI don\u0027t have a aqc111 device to test it, but the code looks very similar.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49051",
          "url": "https://www.suse.com/security/cve/CVE-2022-49051"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237903 for CVE-2022-49051",
          "url": "https://bugzilla.suse.com/1237903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.9,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49051"
    },
    {
      "cve": "CVE-2022-49053",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49053"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: target: tcmu: Fix possible page UAF\n\ntcmu_try_get_data_page() looks up pages under cmdr_lock, but it does not\ntake refcount properly and just returns page pointer. When\ntcmu_try_get_data_page() returns, the returned page may have been freed by\ntcmu_blocks_release().\n\nWe need to get_page() under cmdr_lock to avoid concurrent\ntcmu_blocks_release().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49053",
          "url": "https://www.suse.com/security/cve/CVE-2022-49053"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237918 for CVE-2022-49053",
          "url": "https://bugzilla.suse.com/1237918"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237930 for CVE-2022-49053",
          "url": "https://bugzilla.suse.com/1237930"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49053"
    },
    {
      "cve": "CVE-2022-49058",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49058"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: potential buffer overflow in handling symlinks\n\nSmatch printed a warning:\n\tarch/x86/crypto/poly1305_glue.c:198 poly1305_update_arch() error:\n\t__memcpy() \u0027dctx-\u003ebuf\u0027 too small (16 vs u32max)\n\nIt\u0027s caused because Smatch marks \u0027link_len\u0027 as untrusted since it comes\nfrom sscanf(). Add a check to ensure that \u0027link_len\u0027 is not larger than\nthe size of the \u0027link_str\u0027 buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49058",
          "url": "https://www.suse.com/security/cve/CVE-2022-49058"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237814 for CVE-2022-49058",
          "url": "https://bugzilla.suse.com/1237814"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49058"
    },
    {
      "cve": "CVE-2022-49059",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49059"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: nci: add flush_workqueue to prevent uaf\n\nOur detector found a concurrent use-after-free bug when detaching an\nNCI device. The main reason for this bug is the unexpected scheduling\nbetween the used delayed mechanism (timer and workqueue).\n\nThe race can be demonstrated below:\n\nThread-1                           Thread-2\n                                 | nci_dev_up()\n                                 |   nci_open_device()\n                                 |     __nci_request(nci_reset_req)\n                                 |       nci_send_cmd\n                                 |         queue_work(cmd_work)\nnci_unregister_device()          |\n  nci_close_device()             | ...\n    del_timer_sync(cmd_timer)[1] |\n...                              | Worker\nnci_free_device()                | nci_cmd_work()\n  kfree(ndev)[3]                 |   mod_timer(cmd_timer)[2]\n\nIn short, the cleanup routine thought that the cmd_timer has already\nbeen detached by [1] but the mod_timer can re-attach the timer [2], even\nit is already released [3], resulting in UAF.\n\nThis UAF is easy to trigger, crash trace by POC is like below\n\n[   66.703713] ==================================================================\n[   66.703974] BUG: KASAN: use-after-free in enqueue_timer+0x448/0x490\n[   66.703974] Write of size 8 at addr ffff888009fb7058 by task kworker/u4:1/33\n[   66.703974]\n[   66.703974] CPU: 1 PID: 33 Comm: kworker/u4:1 Not tainted 5.18.0-rc2 #5\n[   66.703974] Workqueue: nfc2_nci_cmd_wq nci_cmd_work\n[   66.703974] Call Trace:\n[   66.703974]  \u003cTASK\u003e\n[   66.703974]  dump_stack_lvl+0x57/0x7d\n[   66.703974]  print_report.cold+0x5e/0x5db\n[   66.703974]  ? enqueue_timer+0x448/0x490\n[   66.703974]  kasan_report+0xbe/0x1c0\n[   66.703974]  ? enqueue_timer+0x448/0x490\n[   66.703974]  enqueue_timer+0x448/0x490\n[   66.703974]  __mod_timer+0x5e6/0xb80\n[   66.703974]  ? mark_held_locks+0x9e/0xe0\n[   66.703974]  ? try_to_del_timer_sync+0xf0/0xf0\n[   66.703974]  ? lockdep_hardirqs_on_prepare+0x17b/0x410\n[   66.703974]  ? queue_work_on+0x61/0x80\n[   66.703974]  ? lockdep_hardirqs_on+0xbf/0x130\n[   66.703974]  process_one_work+0x8bb/0x1510\n[   66.703974]  ? lockdep_hardirqs_on_prepare+0x410/0x410\n[   66.703974]  ? pwq_dec_nr_in_flight+0x230/0x230\n[   66.703974]  ? rwlock_bug.part.0+0x90/0x90\n[   66.703974]  ? _raw_spin_lock_irq+0x41/0x50\n[   66.703974]  worker_thread+0x575/0x1190\n[   66.703974]  ? process_one_work+0x1510/0x1510\n[   66.703974]  kthread+0x2a0/0x340\n[   66.703974]  ? kthread_complete_and_exit+0x20/0x20\n[   66.703974]  ret_from_fork+0x22/0x30\n[   66.703974]  \u003c/TASK\u003e\n[   66.703974]\n[   66.703974] Allocated by task 267:\n[   66.703974]  kasan_save_stack+0x1e/0x40\n[   66.703974]  __kasan_kmalloc+0x81/0xa0\n[   66.703974]  nci_allocate_device+0xd3/0x390\n[   66.703974]  nfcmrvl_nci_register_dev+0x183/0x2c0\n[   66.703974]  nfcmrvl_nci_uart_open+0xf2/0x1dd\n[   66.703974]  nci_uart_tty_ioctl+0x2c3/0x4a0\n[   66.703974]  tty_ioctl+0x764/0x1310\n[   66.703974]  __x64_sys_ioctl+0x122/0x190\n[   66.703974]  do_syscall_64+0x3b/0x90\n[   66.703974]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[   66.703974]\n[   66.703974] Freed by task 406:\n[   66.703974]  kasan_save_stack+0x1e/0x40\n[   66.703974]  kasan_set_track+0x21/0x30\n[   66.703974]  kasan_set_free_info+0x20/0x30\n[   66.703974]  __kasan_slab_free+0x108/0x170\n[   66.703974]  kfree+0xb0/0x330\n[   66.703974]  nfcmrvl_nci_unregister_dev+0x90/0xd0\n[   66.703974]  nci_uart_tty_close+0xdf/0x180\n[   66.703974]  tty_ldisc_kill+0x73/0x110\n[   66.703974]  tty_ldisc_hangup+0x281/0x5b0\n[   66.703974]  __tty_hangup.part.0+0x431/0x890\n[   66.703974]  tty_release+0x3a8/0xc80\n[   66.703974]  __fput+0x1f0/0x8c0\n[   66.703974]  task_work_run+0xc9/0x170\n[   66.703974]  exit_to_user_mode_prepare+0x194/0x1a0\n[   66.703974]  syscall_exit_to_user_mode+0x19/0x50\n[   66.703974]  do_syscall_64+0x48/0x90\n[   66.703974]  entry_SYSCALL_64_after_hwframe+0x44/0x\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49059",
          "url": "https://www.suse.com/security/cve/CVE-2022-49059"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238007 for CVE-2022-49059",
          "url": "https://bugzilla.suse.com/1238007"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49059"
    },
    {
      "cve": "CVE-2022-49065",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49065"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSUNRPC: Fix the svc_deferred_event trace class\n\nFix a NULL deref crash that occurs when an svc_rqst is deferred\nwhile the sunrpc tracing subsystem is enabled. svc_revisit() sets\ndr-\u003exprt to NULL, so it can\u0027t be relied upon in the tracepoint to\nprovide the remote\u0027s address.\n\nUnfortunately we can\u0027t revert the \"svc_deferred_class\" hunk in\ncommit ece200ddd54b (\"sunrpc: Save remote presentation address in\nsvc_xprt for trace events\") because there is now a specific check\nof event format specifiers for unsafe dereferences. The warning\nthat check emits is:\n\n  event svc_defer_recv has unsafe dereference of argument 1\n\nA \"%pISpc\" format specifier with a \"struct sockaddr *\" is indeed\nflagged by this check.\n\nInstead, take the brute-force approach used by the svcrdma_qp_error\ntracepoint. Convert the dr::addr field into a presentation address\nin the TP_fast_assign() arm of the trace event, and store that as\na string. This fix can be backported to -stable kernels.\n\nIn the meantime, commit c6ced22997ad (\"tracing: Update print fmt\ncheck to handle new __get_sockaddr() macro\") is now in v5.18, so\nthis wonky fix can be replaced with __sockaddr() and friends\nproperly during the v5.19 merge window.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49065",
          "url": "https://www.suse.com/security/cve/CVE-2022-49065"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237739 for CVE-2022-49065",
          "url": "https://bugzilla.suse.com/1237739"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49065"
    },
    {
      "cve": "CVE-2022-49066",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49066"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nveth: Ensure eth header is in skb\u0027s linear part\n\nAfter feeding a decapsulated packet to a veth device with act_mirred,\nskb_headlen() may be 0. But veth_xmit() calls __dev_forward_skb(),\nwhich expects at least ETH_HLEN byte of linear data (as\n__dev_forward_skb2() calls eth_type_trans(), which pulls ETH_HLEN bytes\nunconditionally).\n\nUse pskb_may_pull() to ensure veth_xmit() respects this constraint.\n\nkernel BUG at include/linux/skbuff.h:2328!\nRIP: 0010:eth_type_trans+0xcf/0x140\nCall Trace:\n \u003cIRQ\u003e\n __dev_forward_skb2+0xe3/0x160\n veth_xmit+0x6e/0x250 [veth]\n dev_hard_start_xmit+0xc7/0x200\n __dev_queue_xmit+0x47f/0x520\n ? skb_ensure_writable+0x85/0xa0\n ? skb_mpls_pop+0x98/0x1c0\n tcf_mirred_act+0x442/0x47e [act_mirred]\n tcf_action_exec+0x86/0x140\n fl_classify+0x1d8/0x1e0 [cls_flower]\n ? dma_pte_clear_level+0x129/0x1a0\n ? dma_pte_clear_level+0x129/0x1a0\n ? prb_fill_curr_block+0x2f/0xc0\n ? skb_copy_bits+0x11a/0x220\n __tcf_classify+0x58/0x110\n tcf_classify_ingress+0x6b/0x140\n __netif_receive_skb_core.constprop.0+0x47d/0xfd0\n ? __iommu_dma_unmap_swiotlb+0x44/0x90\n __netif_receive_skb_one_core+0x3d/0xa0\n netif_receive_skb+0x116/0x170\n be_process_rx+0x22f/0x330 [be2net]\n be_poll+0x13c/0x370 [be2net]\n __napi_poll+0x2a/0x170\n net_rx_action+0x22f/0x2f0\n __do_softirq+0xca/0x2a8\n __irq_exit_rcu+0xc1/0xe0\n common_interrupt+0x83/0xa0",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49066",
          "url": "https://www.suse.com/security/cve/CVE-2022-49066"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237722 for CVE-2022-49066",
          "url": "https://bugzilla.suse.com/1237722"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49066"
    },
    {
      "cve": "CVE-2022-49074",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49074"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nirqchip/gic-v3: Fix GICR_CTLR.RWP polling\n\nIt turns out that our polling of RWP is totally wrong when checking\nfor it in the redistributors, as we test the *distributor* bit index,\nwhereas it is a different bit number in the RDs... Oopsie boo.\n\nThis is embarassing. Not only because it is wrong, but also because\nit took *8 years* to notice the blunder...\n\nJust fix the damn thing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49074",
          "url": "https://www.suse.com/security/cve/CVE-2022-49074"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237728 for CVE-2022-49074",
          "url": "https://bugzilla.suse.com/1237728"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49074"
    },
    {
      "cve": "CVE-2022-49075",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49075"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbtrfs: fix qgroup reserve overflow the qgroup limit\n\nWe use extent_changeset-\u003ebytes_changed in qgroup_reserve_data() to record\nhow many bytes we set for EXTENT_QGROUP_RESERVED state. Currently the\nbytes_changed is set as \"unsigned int\", and it will overflow if we try to\nfallocate a range larger than 4GiB. The result is we reserve less bytes\nand eventually break the qgroup limit.\n\nUnlike regular buffered/direct write, which we use one changeset for\neach ordered extent, which can never be larger than 256M.  For\nfallocate, we use one changeset for the whole range, thus it no longer\nrespects the 256M per extent limit, and caused the problem.\n\nThe following example test script reproduces the problem:\n\n  $ cat qgroup-overflow.sh\n  #!/bin/bash\n\n  DEV=/dev/sdj\n  MNT=/mnt/sdj\n\n  mkfs.btrfs -f $DEV\n  mount $DEV $MNT\n\n  # Set qgroup limit to 2GiB.\n  btrfs quota enable $MNT\n  btrfs qgroup limit 2G $MNT\n\n  # Try to fallocate a 3GiB file. This should fail.\n  echo\n  echo \"Try to fallocate a 3GiB file...\"\n  fallocate -l 3G $MNT/3G.file\n\n  # Try to fallocate a 5GiB file.\n  echo\n  echo \"Try to fallocate a 5GiB file...\"\n  fallocate -l 5G $MNT/5G.file\n\n  # See we break the qgroup limit.\n  echo\n  sync\n  btrfs qgroup show -r $MNT\n\n  umount $MNT\n\nWhen running the test:\n\n  $ ./qgroup-overflow.sh\n  (...)\n\n  Try to fallocate a 3GiB file...\n  fallocate: fallocate failed: Disk quota exceeded\n\n  Try to fallocate a 5GiB file...\n\n  qgroupid                 rfer                 excl         max_rfer\n  --------                 ----                 ----         --------\n  0/5                     5.00GiB           5.00GiB           2.00GiB\n\nSince we have no control of how bytes_changed is used, it\u0027s better to\nset it to u64.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49075",
          "url": "https://www.suse.com/security/cve/CVE-2022-49075"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237733 for CVE-2022-49075",
          "url": "https://bugzilla.suse.com/1237733"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49075"
    },
    {
      "cve": "CVE-2022-49084",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49084"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nqede: confirm skb is allocated before using\n\nqede_build_skb() assumes build_skb() always works and goes straight\nto skb_reserve(). However, build_skb() can fail under memory pressure.\nThis results in a kernel panic because the skb to reserve is NULL.\n\nAdd a check in case build_skb() failed to allocate and return NULL.\n\nThe NULL return is handled correctly in callers to qede_build_skb().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49084",
          "url": "https://www.suse.com/security/cve/CVE-2022-49084"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237751 for CVE-2022-49084",
          "url": "https://bugzilla.suse.com/1237751"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49084"
    },
    {
      "cve": "CVE-2022-49085",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49085"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrbd: Fix five use after free bugs in get_initial_state\n\nIn get_initial_state, it calls notify_initial_state_done(skb,..) if\ncb-\u003eargs[5]==1. If genlmsg_put() failed in notify_initial_state_done(),\nthe skb will be freed by nlmsg_free(skb).\nThen get_initial_state will goto out and the freed skb will be used by\nreturn value skb-\u003elen, which is a uaf bug.\n\nWhat\u0027s worse, the same problem goes even further: skb can also be\nfreed in the notify_*_state_change -\u003e notify_*_state calls below.\nThus 4 additional uaf bugs happened.\n\nMy patch lets the problem callee functions: notify_initial_state_done\nand notify_*_state_change return an error code if errors happen.\nSo that the error codes could be propagated and the uaf bugs can be avoid.\n\nv2 reports a compilation warning. This v3 fixed this warning and built\nsuccessfully in my local environment with no additional warnings.\nv2: https://lore.kernel.org/patchwork/patch/1435218/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49085",
          "url": "https://www.suse.com/security/cve/CVE-2022-49085"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238036 for CVE-2022-49085",
          "url": "https://bugzilla.suse.com/1238036"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49085"
    },
    {
      "cve": "CVE-2022-49095",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49095"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: zorro7xx: Fix a resource leak in zorro7xx_remove_one()\n\nThe error handling path of the probe releases a resource that is not freed\nin the remove function. In some cases, a ioremap() must be undone.\n\nAdd the missing iounmap() call in the remove function.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49095",
          "url": "https://www.suse.com/security/cve/CVE-2022-49095"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237752 for CVE-2022-49095",
          "url": "https://bugzilla.suse.com/1237752"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49095"
    },
    {
      "cve": "CVE-2022-49098",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49098"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nDrivers: hv: vmbus: Fix potential crash on module unload\n\nThe vmbus driver relies on the panic notifier infrastructure to perform\nsome operations when a panic event is detected. Since vmbus can be built\nas module, it is required that the driver handles both registering and\nunregistering such panic notifier callback.\n\nAfter commit 74347a99e73a (\"x86/Hyper-V: Unload vmbus channel in hv panic callback\")\nthough, the panic notifier registration is done unconditionally in the module\ninitialization routine whereas the unregistering procedure is conditionally\nguarded and executes only if HV_FEATURE_GUEST_CRASH_MSR_AVAILABLE capability\nis set.\n\nThis patch fixes that by unconditionally unregistering the panic notifier\nin the module\u0027s exit routine as well.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49098",
          "url": "https://www.suse.com/security/cve/CVE-2022-49098"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238079 for CVE-2022-49098",
          "url": "https://bugzilla.suse.com/1238079"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49098"
    },
    {
      "cve": "CVE-2022-49100",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49100"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_console: eliminate anonymous module_init \u0026 module_exit\n\nEliminate anonymous module_init() and module_exit(), which can lead to\nconfusion or ambiguity when reading System.map, crashes/oops/bugs,\nor an initcall_debug log.\n\nGive each of these init and exit functions unique driver-specific\nnames to eliminate the anonymous names.\n\nExample 1: (System.map)\n ffffffff832fc78c t init\n ffffffff832fc79e t init\n ffffffff832fc8f8 t init\n\nExample 2: (initcall_debug log)\n calling  init+0x0/0x12 @ 1\n initcall init+0x0/0x12 returned 0 after 15 usecs\n calling  init+0x0/0x60 @ 1\n initcall init+0x0/0x60 returned 0 after 2 usecs\n calling  init+0x0/0x9a @ 1\n initcall init+0x0/0x9a returned 0 after 74 usecs",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49100",
          "url": "https://www.suse.com/security/cve/CVE-2022-49100"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237735 for CVE-2022-49100",
          "url": "https://bugzilla.suse.com/1237735"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49100"
    },
    {
      "cve": "CVE-2022-49107",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49107"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix memory leak in ceph_readdir when note_last_dentry returns error\n\nReset the last_readdir at the same time, and add a comment explaining\nwhy we don\u0027t free last_readdir when dir_emit returns false.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49107",
          "url": "https://www.suse.com/security/cve/CVE-2022-49107"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237973 for CVE-2022-49107",
          "url": "https://bugzilla.suse.com/1237973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49107"
    },
    {
      "cve": "CVE-2022-49109",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49109"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nceph: fix inode reference leakage in ceph_get_snapdir()\n\nThe ceph_get_inode() will search for or insert a new inode into the\nhash for the given vino, and return a reference to it. If new is\nnon-NULL, its reference is consumed.\n\nWe should release the reference when in error handing cases.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49109",
          "url": "https://www.suse.com/security/cve/CVE-2022-49109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237836 for CVE-2022-49109",
          "url": "https://bugzilla.suse.com/1237836"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49109"
    },
    {
      "cve": "CVE-2022-49114",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49114"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: libfc: Fix use after free in fc_exch_abts_resp()\n\nfc_exch_release(ep) will decrease the ep\u0027s reference count. When the\nreference count reaches zero, it is freed. But ep is still used in the\nfollowing code, which will lead to a use after free.\n\nReturn after the fc_exch_release() call to avoid use after free.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49114",
          "url": "https://www.suse.com/security/cve/CVE-2022-49114"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238146 for CVE-2022-49114",
          "url": "https://bugzilla.suse.com/1238146"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49114"
    },
    {
      "cve": "CVE-2022-49119",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49119"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm8001: Fix memory leak in pm8001_chip_fw_flash_update_req()\n\nIn pm8001_chip_fw_flash_update_build(), if\npm8001_chip_fw_flash_update_build() fails, the struct fw_control_ex\nallocated must be freed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49119",
          "url": "https://www.suse.com/security/cve/CVE-2022-49119"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237925 for CVE-2022-49119",
          "url": "https://bugzilla.suse.com/1237925"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49119"
    },
    {
      "cve": "CVE-2022-49120",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49120"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm8001: Fix task leak in pm8001_send_abort_all()\n\nIn pm8001_send_abort_all(), make sure to free the allocated sas task\nif pm8001_tag_alloc() or pm8001_mpi_build_cmd() fail.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49120",
          "url": "https://www.suse.com/security/cve/CVE-2022-49120"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237969 for CVE-2022-49120",
          "url": "https://bugzilla.suse.com/1237969"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49120"
    },
    {
      "cve": "CVE-2022-49122",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49122"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm ioctl: prevent potential spectre v1 gadget\n\nIt appears like cmd could be a Spectre v1 gadget as it\u0027s supplied by a\nuser and used as an array index. Prevent the contents of kernel memory\nfrom being leaked to userspace via speculative execution by using\narray_index_nospec.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49122",
          "url": "https://www.suse.com/security/cve/CVE-2022-49122"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237983 for CVE-2022-49122",
          "url": "https://bugzilla.suse.com/1237983"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49122"
    },
    {
      "cve": "CVE-2022-49155",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49155"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Suppress a kernel complaint in qla_create_qpair()\n\n[   12.323788] BUG: using smp_processor_id() in preemptible [00000000] code: systemd-udevd/1020\n[   12.332297] caller is qla2xxx_create_qpair+0x32a/0x5d0 [qla2xxx]\n[   12.338417] CPU: 7 PID: 1020 Comm: systemd-udevd Tainted: G          I      --------- ---  5.14.0-29.el9.x86_64 #1\n[   12.348827] Hardware name: Dell Inc. PowerEdge R610/0F0XJ6, BIOS 6.6.0 05/22/2018\n[   12.356356] Call Trace:\n[   12.358821]  dump_stack_lvl+0x34/0x44\n[   12.362514]  check_preemption_disabled+0xd9/0xe0\n[   12.367164]  qla2xxx_create_qpair+0x32a/0x5d0 [qla2xxx]\n[   12.372481]  qla2x00_probe_one+0xa3a/0x1b80 [qla2xxx]\n[   12.377617]  ? _raw_spin_lock_irqsave+0x19/0x40\n[   12.384284]  local_pci_probe+0x42/0x80\n[   12.390162]  ? pci_match_device+0xd7/0x110\n[   12.396366]  pci_device_probe+0xfd/0x1b0\n[   12.402372]  really_probe+0x1e7/0x3e0\n[   12.408114]  __driver_probe_device+0xfe/0x180\n[   12.414544]  driver_probe_device+0x1e/0x90\n[   12.420685]  __driver_attach+0xc0/0x1c0\n[   12.426536]  ? __device_attach_driver+0xe0/0xe0\n[   12.433061]  ? __device_attach_driver+0xe0/0xe0\n[   12.439538]  bus_for_each_dev+0x78/0xc0\n[   12.445294]  bus_add_driver+0x12b/0x1e0\n[   12.451021]  driver_register+0x8f/0xe0\n[   12.456631]  ? 0xffffffffc07bc000\n[   12.461773]  qla2x00_module_init+0x1be/0x229 [qla2xxx]\n[   12.468776]  do_one_initcall+0x44/0x200\n[   12.474401]  ? load_module+0xad3/0xba0\n[   12.479908]  ? kmem_cache_alloc_trace+0x45/0x410\n[   12.486268]  do_init_module+0x5c/0x280\n[   12.491730]  __do_sys_init_module+0x12e/0x1b0\n[   12.497785]  do_syscall_64+0x3b/0x90\n[   12.503029]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[   12.509764] RIP: 0033:0x7f554f73ab2e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49155",
          "url": "https://www.suse.com/security/cve/CVE-2022-49155"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237941 for CVE-2022-49155",
          "url": "https://bugzilla.suse.com/1237941"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49155"
    },
    {
      "cve": "CVE-2022-49156",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49156"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix scheduling while atomic\n\nThe driver makes a call into midlayer (fc_remote_port_delete) which can put\nthe thread to sleep. The thread that originates the call is in interrupt\ncontext. The combination of the two trigger a crash. Schedule the call in\nnon-interrupt context where it is more safe.\n\nkernel: BUG: scheduling while atomic: swapper/7/0/0x00010000\nkernel: Call Trace:\nkernel:  \u003cIRQ\u003e\nkernel:  dump_stack+0x66/0x81\nkernel:  __schedule_bug.cold.90+0x5/0x1d\nkernel:  __schedule+0x7af/0x960\nkernel:  schedule+0x28/0x80\nkernel:  schedule_timeout+0x26d/0x3b0\nkernel:  wait_for_completion+0xb4/0x140\nkernel:  ? wake_up_q+0x70/0x70\nkernel:  __wait_rcu_gp+0x12c/0x160\nkernel:  ? sdev_evt_alloc+0xc0/0x180 [scsi_mod]\nkernel:  synchronize_sched+0x6c/0x80\nkernel:  ? call_rcu_bh+0x20/0x20\nkernel:  ? __bpf_trace_rcu_invoke_callback+0x10/0x10\nkernel:  sdev_evt_alloc+0xfd/0x180 [scsi_mod]\nkernel:  starget_for_each_device+0x85/0xb0 [scsi_mod]\nkernel:  ? scsi_init_io+0x360/0x3d0 [scsi_mod]\nkernel:  scsi_init_io+0x388/0x3d0 [scsi_mod]\nkernel:  device_for_each_child+0x54/0x90\nkernel:  fc_remote_port_delete+0x70/0xe0 [scsi_transport_fc]\nkernel:  qla2x00_schedule_rport_del+0x62/0xf0 [qla2xxx]\nkernel:  qla2x00_mark_device_lost+0x9c/0xd0 [qla2xxx]\nkernel:  qla24xx_handle_plogi_done_event+0x55f/0x570 [qla2xxx]\nkernel:  qla2x00_async_login_sp_done+0xd2/0x100 [qla2xxx]\nkernel:  qla24xx_logio_entry+0x13a/0x3c0 [qla2xxx]\nkernel:  qla24xx_process_response_queue+0x306/0x400 [qla2xxx]\nkernel:  qla24xx_msix_rsp_q+0x3f/0xb0 [qla2xxx]\nkernel:  __handle_irq_event_percpu+0x40/0x180\nkernel:  handle_irq_event_percpu+0x30/0x80\nkernel:  handle_irq_event+0x36/0x60",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49156",
          "url": "https://www.suse.com/security/cve/CVE-2022-49156"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238168 for CVE-2022-49156",
          "url": "https://bugzilla.suse.com/1238168"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49156"
    },
    {
      "cve": "CVE-2022-49157",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49157"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix premature hw access after PCI error\n\nAfter a recoverable PCI error has been detected and recovered, qla driver\nneeds to check to see if the error condition still persist and/or wait\nfor the OS to give the resume signal.\n\nSep  8 22:26:03 localhost kernel: WARNING: CPU: 9 PID: 124606 at qla_tmpl.c:440\nqla27xx_fwdt_entry_t266+0x55/0x60 [qla2xxx]\nSep  8 22:26:03 localhost kernel: RIP: 0010:qla27xx_fwdt_entry_t266+0x55/0x60\n[qla2xxx]\nSep  8 22:26:03 localhost kernel: Call Trace:\nSep  8 22:26:03 localhost kernel: ? qla27xx_walk_template+0xb1/0x1b0 [qla2xxx]\nSep  8 22:26:03 localhost kernel: ? qla27xx_execute_fwdt_template+0x12a/0x160\n[qla2xxx]\nSep  8 22:26:03 localhost kernel: ? qla27xx_fwdump+0xa0/0x1c0 [qla2xxx]\nSep  8 22:26:03 localhost kernel: ? qla2xxx_pci_mmio_enabled+0xfb/0x120\n[qla2xxx]\nSep  8 22:26:03 localhost kernel: ? report_mmio_enabled+0x44/0x80\nSep  8 22:26:03 localhost kernel: ? report_slot_reset+0x80/0x80\nSep  8 22:26:03 localhost kernel: ? pci_walk_bus+0x70/0x90\nSep  8 22:26:03 localhost kernel: ? aer_dev_correctable_show+0xc0/0xc0\nSep  8 22:26:03 localhost kernel: ? pcie_do_recovery+0x1bb/0x240\nSep  8 22:26:03 localhost kernel: ? aer_recover_work_func+0xaa/0xd0\nSep  8 22:26:03 localhost kernel: ? process_one_work+0x1a7/0x360\n..\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-8041:22: detected PCI\ndisconnect.\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-107ff:22:\nqla27xx_fwdt_entry_t262: dump ram MB failed. Area 5h start 198013h end 198013h\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-107ff:22: Unable to\ncapture FW dump\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-1015:22: cmd=0x0,\nwaited 5221 msecs\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-680d:22: mmio\nenabled returning.\nSep  8 22:26:03 localhost kernel: qla2xxx [0000:42:00.2]-d04c:22: MBX\nCommand timeout for cmd 0, iocontrol=ffffffff jiffies=10140f2e5\nmb[0-3]=[0xffff 0xffff 0xffff 0xffff]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49157",
          "url": "https://www.suse.com/security/cve/CVE-2022-49157"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238169 for CVE-2022-49157",
          "url": "https://bugzilla.suse.com/1238169"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49157"
    },
    {
      "cve": "CVE-2022-49158",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49158"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix warning message due to adisc being flushed\n\nFix warning message due to adisc being flushed.  Linux kernel triggered a\nwarning message where a different error code type is not matching up with\nthe expected type. Add additional translation of one error code type to\nanother.\n\nWARNING: CPU: 2 PID: 1131623 at drivers/scsi/qla2xxx/qla_init.c:498\nqla2x00_async_adisc_sp_done+0x294/0x2b0 [qla2xxx]\nCPU: 2 PID: 1131623 Comm: drmgr Not tainted 5.13.0-rc1-autotest #1\n..\nGPR28: c000000aaa9c8890 c0080000079ab678 c00000140a104800 c00000002bd19000\nNIP [c00800000790857c] qla2x00_async_adisc_sp_done+0x294/0x2b0 [qla2xxx]\nLR [c008000007908578] qla2x00_async_adisc_sp_done+0x290/0x2b0 [qla2xxx]\nCall Trace:\n[c00000001cdc3620] [c008000007908578] qla2x00_async_adisc_sp_done+0x290/0x2b0 [qla2xxx] (unreliable)\n[c00000001cdc3710] [c0080000078f3080] __qla2x00_abort_all_cmds+0x1b8/0x580 [qla2xxx]\n[c00000001cdc3840] [c0080000078f589c] qla2x00_abort_all_cmds+0x34/0xd0 [qla2xxx]\n[c00000001cdc3880] [c0080000079153d8] qla2x00_abort_isp_cleanup+0x3f0/0x570 [qla2xxx]\n[c00000001cdc3920] [c0080000078fb7e8] qla2x00_remove_one+0x3d0/0x480 [qla2xxx]\n[c00000001cdc39b0] [c00000000071c274] pci_device_remove+0x64/0x120\n[c00000001cdc39f0] [c0000000007fb818] device_release_driver_internal+0x168/0x2a0\n[c00000001cdc3a30] [c00000000070e304] pci_stop_bus_device+0xb4/0x100\n[c00000001cdc3a70] [c00000000070e4f0] pci_stop_and_remove_bus_device+0x20/0x40\n[c00000001cdc3aa0] [c000000000073940] pci_hp_remove_devices+0x90/0x130\n[c00000001cdc3b30] [c0080000070704d0] disable_slot+0x38/0x90 [rpaphp] [\nc00000001cdc3b60] [c00000000073eb4c] power_write_file+0xcc/0x180\n[c00000001cdc3be0] [c0000000007354bc] pci_slot_attr_store+0x3c/0x60\n[c00000001cdc3c00] [c00000000055f820] sysfs_kf_write+0x60/0x80 [c00000001cdc3c20]\n[c00000000055df10] kernfs_fop_write_iter+0x1a0/0x290\n[c00000001cdc3c70] [c000000000447c4c] new_sync_write+0x14c/0x1d0\n[c00000001cdc3d10] [c00000000044b134] vfs_write+0x224/0x330\n[c00000001cdc3d60] [c00000000044b3f4] ksys_write+0x74/0x130\n[c00000001cdc3db0] [c00000000002df70] system_call_exception+0x150/0x2d0\n[c00000001cdc3e10] [c00000000000d45c] system_call_common+0xec/0x278",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49158",
          "url": "https://www.suse.com/security/cve/CVE-2022-49158"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238170 for CVE-2022-49158",
          "url": "https://bugzilla.suse.com/1238170"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 0,
            "baseSeverity": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49158"
    },
    {
      "cve": "CVE-2022-49159",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49159"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Implement ref count for SRB\n\nThe timeout handler and the done function are racing. When\nqla2x00_async_iocb_timeout() starts to run it can be preempted by the\nnormal response path (via the firmware?). qla24xx_async_gpsc_sp_done()\nreleases the SRB unconditionally. When scheduling back to\nqla2x00_async_iocb_timeout() qla24xx_async_abort_cmd() will access an freed\nsp-\u003eqpair pointer:\n\n  qla2xxx [0000:83:00.0]-2871:0: Async-gpsc timeout - hdl=63d portid=234500 50:06:0e:80:08:77:b6:21.\n  qla2xxx [0000:83:00.0]-2853:0: Async done-gpsc res 0, WWPN 50:06:0e:80:08:77:b6:21\n  qla2xxx [0000:83:00.0]-2854:0: Async-gpsc OUT WWPN 20:45:00:27:f8:75:33:00 speeds=2c00 speed=0400.\n  qla2xxx [0000:83:00.0]-28d8:0: qla24xx_handle_gpsc_event 50:06:0e:80:08:77:b6:21 DS 7 LS 6 rc 0 login 1|1 rscn 1|0 lid 5\n  BUG: unable to handle kernel NULL pointer dereference at 0000000000000004\n  IP: qla24xx_async_abort_cmd+0x1b/0x1c0 [qla2xxx]\n\nObvious solution to this is to introduce a reference counter. One reference\nis taken for the normal code path (the \u0027good\u0027 case) and one for the timeout\npath. As we always race between the normal good case and the timeout/abort\nhandler we need to serialize it. Also we cannot assume any order between\nthe handlers. Since this is slow path we can use proper synchronization via\nlocks.\n\nWhen we are able to cancel a timer (del_timer returns 1) we know there\ncan\u0027t be any error handling in progress because the timeout handler hasn\u0027t\nexpired yet, thus we can safely decrement the refcounter by one.\n\nIf we are not able to cancel the timer, we know an abort handler is\nrunning. We have to make sure we call sp-\u003edone() in the abort handlers\nbefore calling kref_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49159",
          "url": "https://www.suse.com/security/cve/CVE-2022-49159"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238171 for CVE-2022-49159",
          "url": "https://bugzilla.suse.com/1238171"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49159"
    },
    {
      "cve": "CVE-2022-49160",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49160"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qla2xxx: Fix crash during module load unload test\n\nDuring purex packet handling the driver was incorrectly freeing a\npre-allocated structure. Fix this by skipping that entry.\n\nSystem crashed with the following stack during a module unload test.\n\nCall Trace:\n\tsbitmap_init_node+0x7f/0x1e0\n\tsbitmap_queue_init_node+0x24/0x150\n\tblk_mq_init_bitmaps+0x3d/0xa0\n\tblk_mq_init_tags+0x68/0x90\n\tblk_mq_alloc_map_and_rqs+0x44/0x120\n\tblk_mq_alloc_set_map_and_rqs+0x63/0x150\n\tblk_mq_alloc_tag_set+0x11b/0x230\n\tscsi_add_host_with_dma.cold+0x3f/0x245\n\tqla2x00_probe_one+0xd5a/0x1b80 [qla2xxx]\n\nCall Trace with slub_debug and debug kernel:\n\tkasan_report_invalid_free+0x50/0x80\n\t__kasan_slab_free+0x137/0x150\n\tslab_free_freelist_hook+0xc6/0x190\n\tkfree+0xe8/0x2e0\n\tqla2x00_free_device+0x3bb/0x5d0 [qla2xxx]\n\tqla2x00_remove_one+0x668/0xcf0 [qla2xxx]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49160",
          "url": "https://www.suse.com/security/cve/CVE-2022-49160"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238172 for CVE-2022-49160",
          "url": "https://bugzilla.suse.com/1238172"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49160"
    },
    {
      "cve": "CVE-2022-49164",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49164"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/tm: Fix more userspace r13 corruption\n\nCommit cf13435b730a (\"powerpc/tm: Fix userspace r13 corruption\") fixes a\nproblem in treclaim where a SLB miss can occur on the\nthread_struct-\u003eckpt_regs while SCRATCH0 is live with the saved user r13\nvalue, clobbering it with the kernel r13 and ultimately resulting in\nkernel r13 being stored in ckpt_regs.\n\nThere is an equivalent problem in trechkpt where the user r13 value is\nloaded into r13 from chkpt_regs to be recheckpointed, but a SLB miss\ncould occur on ckpt_regs accesses after that, which will result in r13\nbeing clobbered with a kernel value and that will get recheckpointed and\nthen restored to user registers.\n\nThe same memory page is accessed right before this critical window where\na SLB miss could cause corruption, so hitting the bug requires the SLB\nentry be removed within a small window of instructions, which is\npossible if a SLB related MCE hits there. PAPR also permits the\nhypervisor to discard this SLB entry (because slb_shadow-\u003epersistent is\nonly set to SLB_NUM_BOLTED) although it\u0027s not known whether any\nimplementations would do this (KVM does not). So this is an extremely\nunlikely bug, only found by inspection.\n\nFix this by also storing user r13 in a temporary location on the kernel\nstack and don\u0027t change the r13 register from kernel r13 until the RI=0\ncritical section that does not fault.\n\nThe SCRATCH0 change is not strictly part of the fix, it\u0027s only used in\nthe RI=0 section so it does not have the same problem as the previous\nSCRATCH0 bug.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49164",
          "url": "https://www.suse.com/security/cve/CVE-2022-49164"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238108 for CVE-2022-49164",
          "url": "https://bugzilla.suse.com/1238108"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49164"
    },
    {
      "cve": "CVE-2022-49191",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49191"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmxser: fix xmit_buf leak in activate when LSR == 0xff\n\nWhen LSR is 0xff in -\u003eactivate() (rather unlike), we return an error.\nProvided -\u003eshutdown() is not called when -\u003eactivate() fails, nothing\nactually frees the buffer in this case.\n\nFix this by properly freeing the buffer in a designated label. We jump\nthere also from the \"!info-\u003etype\" if now too.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49191",
          "url": "https://www.suse.com/security/cve/CVE-2022-49191"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238133 for CVE-2022-49191",
          "url": "https://bugzilla.suse.com/1238133"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49191"
    },
    {
      "cve": "CVE-2022-49196",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49196"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/pseries: Fix use after free in remove_phb_dynamic()\n\nIn remove_phb_dynamic() we use \u0026phb-\u003eio_resource, after we\u0027ve called\ndevice_unregister(\u0026host_bridge-\u003edev). But the unregister may have freed\nphb, because pcibios_free_controller_deferred() is the release function\nfor the host_bridge.\n\nIf there are no outstanding references when we call device_unregister()\nthen phb will be freed out from under us.\n\nThis has gone mainly unnoticed, but with slub_debug and page_poison\nenabled it can lead to a crash:\n\n  PID: 7574   TASK: c0000000d492cb80  CPU: 13  COMMAND: \"drmgr\"\n   #0 [c0000000e4f075a0] crash_kexec at c00000000027d7dc\n   #1 [c0000000e4f075d0] oops_end at c000000000029608\n   #2 [c0000000e4f07650] __bad_page_fault at c0000000000904b4\n   #3 [c0000000e4f076c0] do_bad_slb_fault at c00000000009a5a8\n   #4 [c0000000e4f076f0] data_access_slb_common_virt at c000000000008b30\n   Data SLB Access [380] exception frame:\n   R0:  c000000000167250    R1:  c0000000e4f07a00    R2:  c000000002a46100\n   R3:  c000000002b39ce8    R4:  00000000000000c0    R5:  00000000000000a9\n   R6:  3894674d000000c0    R7:  0000000000000000    R8:  00000000000000ff\n   R9:  0000000000000100    R10: 6b6b6b6b6b6b6b6b    R11: 0000000000008000\n   R12: c00000000023da80    R13: c0000009ffd38b00    R14: 0000000000000000\n   R15: 000000011c87f0f0    R16: 0000000000000006    R17: 0000000000000003\n   R18: 0000000000000002    R19: 0000000000000004    R20: 0000000000000005\n   R21: 000000011c87ede8    R22: 000000011c87c5a8    R23: 000000011c87d3a0\n   R24: 0000000000000000    R25: 0000000000000001    R26: c0000000e4f07cc8\n   R27: c00000004d1cc400    R28: c0080000031d00e8    R29: c00000004d23d800\n   R30: c00000004d1d2400    R31: c00000004d1d2540\n   NIP: c000000000167258    MSR: 8000000000009033    OR3: c000000000e9f474\n   CTR: 0000000000000000    LR:  c000000000167250    XER: 0000000020040003\n   CCR: 0000000024088420    MQ:  0000000000000000    DAR: 6b6b6b6b6b6b6ba3\n   DSISR: c0000000e4f07920     Syscall Result: fffffffffffffff2\n   [NIP  : release_resource+56]\n   [LR   : release_resource+48]\n   #5 [c0000000e4f07a00] release_resource at c000000000167258  (unreliable)\n   #6 [c0000000e4f07a30] remove_phb_dynamic at c000000000105648\n   #7 [c0000000e4f07ab0] dlpar_remove_slot at c0080000031a09e8 [rpadlpar_io]\n   #8 [c0000000e4f07b50] remove_slot_store at c0080000031a0b9c [rpadlpar_io]\n   #9 [c0000000e4f07be0] kobj_attr_store at c000000000817d8c\n  #10 [c0000000e4f07c00] sysfs_kf_write at c00000000063e504\n  #11 [c0000000e4f07c20] kernfs_fop_write_iter at c00000000063d868\n  #12 [c0000000e4f07c70] new_sync_write at c00000000054339c\n  #13 [c0000000e4f07d10] vfs_write at c000000000546624\n  #14 [c0000000e4f07d60] ksys_write at c0000000005469f4\n  #15 [c0000000e4f07db0] system_call_exception at c000000000030840\n  #16 [c0000000e4f07e10] system_call_vectored_common at c00000000000c168\n\nTo avoid it, we can take a reference to the host_bridge-\u003edev until we\u0027re\ndone using phb. Then when we drop the reference the phb will be freed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49196",
          "url": "https://www.suse.com/security/cve/CVE-2022-49196"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238274 for CVE-2022-49196",
          "url": "https://bugzilla.suse.com/1238274"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49196"
    },
    {
      "cve": "CVE-2022-49204",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49204"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix more uncharged while msg has more_data\n\nIn tcp_bpf_send_verdict(), if msg has more data after\ntcp_bpf_sendmsg_redir():\n\ntcp_bpf_send_verdict()\n tosend = msg-\u003esg.size  //msg-\u003esg.size = 22220\n case __SK_REDIRECT:\n  sk_msg_return()  //uncharged msg-\u003esg.size(22220) sk-\u003esk_forward_alloc\n  tcp_bpf_sendmsg_redir() //after tcp_bpf_sendmsg_redir, msg-\u003esg.size=11000\n goto more_data;\n tosend = msg-\u003esg.size  //msg-\u003esg.size = 11000\n case __SK_REDIRECT:\n  sk_msg_return()  //uncharged msg-\u003esg.size(11000) to sk-\u003esk_forward_alloc\n\nThe msg-\u003esg.size(11000) has been uncharged twice, to fix we can charge the\nremaining msg-\u003esg.size before goto more data.\n\nThis issue can cause the following info:\nWARNING: CPU: 0 PID: 9860 at net/core/stream.c:208 sk_stream_kill_queues+0xd4/0x1a0\nCall Trace:\n \u003cTASK\u003e\n inet_csk_destroy_sock+0x55/0x110\n __tcp_close+0x279/0x470\n tcp_close+0x1f/0x60\n inet_release+0x3f/0x80\n __sock_release+0x3d/0xb0\n sock_close+0x11/0x20\n __fput+0x92/0x250\n task_work_run+0x6a/0xa0\n do_exit+0x33b/0xb60\n do_group_exit+0x2f/0xa0\n get_signal+0xb6/0x950\n arch_do_signal_or_restart+0xac/0x2a0\n ? vfs_write+0x237/0x290\n exit_to_user_mode_prepare+0xa9/0x200\n syscall_exit_to_user_mode+0x12/0x30\n do_syscall_64+0x46/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n \u003c/TASK\u003e\n\nWARNING: CPU: 0 PID: 2136 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x13c/0x260\nCall Trace:\n \u003cTASK\u003e\n __sk_destruct+0x24/0x1f0\n sk_psock_destroy+0x19b/0x1c0\n process_one_work+0x1b3/0x3c0\n worker_thread+0x30/0x350\n ? process_one_work+0x3c0/0x3c0\n kthread+0xe6/0x110\n ? kthread_complete_and_exit+0x20/0x20\n ret_from_fork+0x22/0x30\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49204",
          "url": "https://www.suse.com/security/cve/CVE-2022-49204"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238240 for CVE-2022-49204",
          "url": "https://bugzilla.suse.com/1238240"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49204"
    },
    {
      "cve": "CVE-2022-49209",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49209"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf, sockmap: Fix memleak in tcp_bpf_sendmsg while sk msg is full\n\nIf tcp_bpf_sendmsg() is running while sk msg is full. When sk_msg_alloc()\nreturns -ENOMEM error, tcp_bpf_sendmsg() goes to wait_for_memory. If partial\nmemory has been alloced by sk_msg_alloc(), that is, msg_tx-\u003esg.size is\ngreater than osize after sk_msg_alloc(), memleak occurs. To fix we use\nsk_msg_trim() to release the allocated memory, then goto wait for memory.\n\nOther call paths of sk_msg_alloc() have the similar issue, such as\ntls_sw_sendmsg(), so handle sk_msg_trim logic inside sk_msg_alloc(),\nas Cong Wang suggested.\n\nThis issue can cause the following info:\nWARNING: CPU: 3 PID: 7950 at net/core/stream.c:208 sk_stream_kill_queues+0xd4/0x1a0\nCall Trace:\n \u003cTASK\u003e\n inet_csk_destroy_sock+0x55/0x110\n __tcp_close+0x279/0x470\n tcp_close+0x1f/0x60\n inet_release+0x3f/0x80\n __sock_release+0x3d/0xb0\n sock_close+0x11/0x20\n __fput+0x92/0x250\n task_work_run+0x6a/0xa0\n do_exit+0x33b/0xb60\n do_group_exit+0x2f/0xa0\n get_signal+0xb6/0x950\n arch_do_signal_or_restart+0xac/0x2a0\n exit_to_user_mode_prepare+0xa9/0x200\n syscall_exit_to_user_mode+0x12/0x30\n do_syscall_64+0x46/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n \u003c/TASK\u003e\n\nWARNING: CPU: 3 PID: 2094 at net/ipv4/af_inet.c:155 inet_sock_destruct+0x13c/0x260\nCall Trace:\n \u003cTASK\u003e\n __sk_destruct+0x24/0x1f0\n sk_psock_destroy+0x19b/0x1c0\n process_one_work+0x1b3/0x3c0\n kthread+0xe6/0x110\n ret_from_fork+0x22/0x30\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49209",
          "url": "https://www.suse.com/security/cve/CVE-2022-49209"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238252 for CVE-2022-49209",
          "url": "https://bugzilla.suse.com/1238252"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49209"
    },
    {
      "cve": "CVE-2022-49217",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49217"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: pm8001: Fix abort all task initialization\n\nIn pm80xx_send_abort_all(), the n_elem field of the ccb used is not\ninitialized to 0. This missing initialization sometimes lead to the task\ncompletion path seeing the ccb with a non-zero n_elem resulting in the\nexecution of invalid dma_unmap_sg() calls in pm8001_ccb_task_free(),\ncausing a crash such as:\n\n[  197.676341] RIP: 0010:iommu_dma_unmap_sg+0x6d/0x280\n[  197.700204] RSP: 0018:ffff889bbcf89c88 EFLAGS: 00010012\n[  197.705485] RAX: dffffc0000000000 RBX: 0000000000000000 RCX: ffffffff83d0bda0\n[  197.712687] RDX: 0000000000000002 RSI: 0000000000000000 RDI: ffff88810dffc0d0\n[  197.719887] RBP: 0000000000000000 R08: 0000000000000000 R09: ffff8881c790098b\n[  197.727089] R10: ffffed1038f20131 R11: 0000000000000001 R12: 0000000000000000\n[  197.734296] R13: ffff88810dffc0d0 R14: 0000000000000010 R15: 0000000000000000\n[  197.741493] FS:  0000000000000000(0000) GS:ffff889bbcf80000(0000) knlGS:0000000000000000\n[  197.749659] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  197.755459] CR2: 00007f16c1b42734 CR3: 0000000004814000 CR4: 0000000000350ee0\n[  197.762656] Call Trace:\n[  197.765127]  \u003cIRQ\u003e\n[  197.767162]  pm8001_ccb_task_free+0x5f1/0x820 [pm80xx]\n[  197.772364]  ? do_raw_spin_unlock+0x54/0x220\n[  197.776680]  pm8001_mpi_task_abort_resp+0x2ce/0x4f0 [pm80xx]\n[  197.782406]  process_oq+0xe85/0x7890 [pm80xx]\n[  197.786817]  ? lock_acquire+0x194/0x490\n[  197.790697]  ? handle_irq_event+0x10e/0x1b0\n[  197.794920]  ? mpi_sata_completion+0x2d70/0x2d70 [pm80xx]\n[  197.800378]  ? __wake_up_bit+0x100/0x100\n[  197.804340]  ? lock_is_held_type+0x98/0x110\n[  197.808565]  pm80xx_chip_isr+0x94/0x130 [pm80xx]\n[  197.813243]  tasklet_action_common.constprop.0+0x24b/0x2f0\n[  197.818785]  __do_softirq+0x1b5/0x82d\n[  197.822485]  ? do_raw_spin_unlock+0x54/0x220\n[  197.826799]  __irq_exit_rcu+0x17e/0x1e0\n[  197.830678]  irq_exit_rcu+0xa/0x20\n[  197.834114]  common_interrupt+0x78/0x90\n[  197.840051]  \u003c/IRQ\u003e\n[  197.844236]  \u003cTASK\u003e\n[  197.848397]  asm_common_interrupt+0x1e/0x40\n\nAvoid this issue by always initializing the ccb n_elem field to 0 in\npm8001_send_abort_all(), pm8001_send_read_log() and\npm80xx_send_abort_all().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49217",
          "url": "https://www.suse.com/security/cve/CVE-2022-49217"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238313 for CVE-2022-49217",
          "url": "https://bugzilla.suse.com/1238313"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49217"
    },
    {
      "cve": "CVE-2022-49220",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49220"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndax: make sure inodes are flushed before destroy cache\n\nA bug can be triggered by following command\n\n$ modprobe nd_pmem \u0026\u0026 modprobe -r nd_pmem\n\n[   10.060014] BUG dax_cache (Not tainted): Objects remaining in dax_cache on __kmem_cache_shutdown()\n[   10.060938] Slab 0x0000000085b729ac objects=9 used=1 fp=0x000000004f5ae469 flags=0x200000000010200(slab|head|node)\n[   10.062433] Call Trace:\n[   10.062673]  dump_stack_lvl+0x34/0x44\n[   10.062865]  slab_err+0x90/0xd0\n[   10.063619]  __kmem_cache_shutdown+0x13b/0x2f0\n[   10.063848]  kmem_cache_destroy+0x4a/0x110\n[   10.064058]  __x64_sys_delete_module+0x265/0x300\n\nThis is caused by dax_fs_exit() not flushing inodes before destroy cache.\nTo fix this issue, call rcu_barrier() before destroy cache.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49220",
          "url": "https://www.suse.com/security/cve/CVE-2022-49220"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237936 for CVE-2022-49220",
          "url": "https://bugzilla.suse.com/1237936"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49220"
    },
    {
      "cve": "CVE-2022-49226",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49226"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: asix: add proper error handling of usb read errors\n\nSyzbot once again hit uninit value in asix driver. The problem still the\nsame -- asix_read_cmd() reads less bytes, than was requested by caller.\n\nSince all read requests are performed via asix_read_cmd() let\u0027s catch\nusb related error there and add __must_check notation to be sure all\ncallers actually check return value.\n\nSo, this patch adds sanity check inside asix_read_cmd(), that simply\nchecks if bytes read are not less, than was requested and adds missing\nerror handling of asix_read_cmd() all across the driver code.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49226",
          "url": "https://www.suse.com/security/cve/CVE-2022-49226"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238336 for CVE-2022-49226",
          "url": "https://bugzilla.suse.com/1238336"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49226"
    },
    {
      "cve": "CVE-2022-49259",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49259"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nblock: don\u0027t delete queue kobject before its children\n\nkobjects aren\u0027t supposed to be deleted before their child kobjects are\ndeleted.  Apparently this is usually benign; however, a WARN will be\ntriggered if one of the child kobjects has a named attribute group:\n\n    sysfs group \u0027modes\u0027 not found for kobject \u0027crypto\u0027\n    WARNING: CPU: 0 PID: 1 at fs/sysfs/group.c:278 sysfs_remove_group+0x72/0x80\n    ...\n    Call Trace:\n      sysfs_remove_groups+0x29/0x40 fs/sysfs/group.c:312\n      __kobject_del+0x20/0x80 lib/kobject.c:611\n      kobject_cleanup+0xa4/0x140 lib/kobject.c:696\n      kobject_release lib/kobject.c:736 [inline]\n      kref_put include/linux/kref.h:65 [inline]\n      kobject_put+0x53/0x70 lib/kobject.c:753\n      blk_crypto_sysfs_unregister+0x10/0x20 block/blk-crypto-sysfs.c:159\n      blk_unregister_queue+0xb0/0x110 block/blk-sysfs.c:962\n      del_gendisk+0x117/0x250 block/genhd.c:610\n\nFix this by moving the kobject_del() and the corresponding\nkobject_uevent() to the correct place.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49259",
          "url": "https://www.suse.com/security/cve/CVE-2022-49259"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238413 for CVE-2022-49259",
          "url": "https://bugzilla.suse.com/1238413"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49259"
    },
    {
      "cve": "CVE-2022-49264",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49264"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nexec: Force single empty string when argv is empty\n\nQuoting[1] Ariadne Conill:\n\n\"In several other operating systems, it is a hard requirement that the\nsecond argument to execve(2) be the name of a program, thus prohibiting\na scenario where argc \u003c 1. POSIX 2017 also recommends this behaviour,\nbut it is not an explicit requirement[2]:\n\n    The argument arg0 should point to a filename string that is\n    associated with the process being started by one of the exec\n    functions.\n...\nInterestingly, Michael Kerrisk opened an issue about this in 2008[3],\nbut there was no consensus to support fixing this issue then.\nHopefully now that CVE-2021-4034 shows practical exploitative use[4]\nof this bug in a shellcode, we can reconsider.\n\nThis issue is being tracked in the KSPP issue tracker[5].\"\n\nWhile the initial code searches[6][7] turned up what appeared to be\nmostly corner case tests, trying to that just reject argv == NULL\n(or an immediately terminated pointer list) quickly started tripping[8]\nexisting userspace programs.\n\nThe next best approach is forcing a single empty string into argv and\nadjusting argc to match. The number of programs depending on argc == 0\nseems a smaller set than those calling execve with a NULL argv.\n\nAccount for the additional stack space in bprm_stack_limits(). Inject an\nempty string when argc == 0 (and set argc = 1). Warn about the case so\nuserspace has some notice about the change:\n\n    process \u0027./argc0\u0027 launched \u0027./argc0\u0027 with NULL argv: empty string added\n\nAdditionally WARN() and reject NULL argv usage for kernel threads.\n\n[1] https://lore.kernel.org/lkml/20220127000724.15106-1-ariadne@dereferenced.org/\n[2] https://pubs.opengroup.org/onlinepubs/9699919799/functions/exec.html\n[3] https://bugzilla.kernel.org/show_bug.cgi?id=8408\n[4] https://www.qualys.com/2022/01/25/cve-2021-4034/pwnkit.txt\n[5] https://github.com/KSPP/linux/issues/176\n[6] https://codesearch.debian.net/search?q=execve%5C+*%5C%28%5B%5E%2C%5D%2B%2C+*NULL\u0026literal=0\n[7] https://codesearch.debian.net/search?q=execlp%3F%5Cs*%5C%28%5B%5E%2C%5D%2B%2C%5Cs*NULL\u0026literal=0\n[8] https://lore.kernel.org/lkml/20220131144352.GE16385@xsang-OptiPlex-9020/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49264",
          "url": "https://www.suse.com/security/cve/CVE-2022-49264"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237815 for CVE-2022-49264",
          "url": "https://bugzilla.suse.com/1237815"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49264"
    },
    {
      "cve": "CVE-2022-49271",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49271"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: prevent bad output lengths in smb2_ioctl_query_info()\n\nWhen calling smb2_ioctl_query_info() with\nsmb_query_info::flags=PASSTHRU_FSCTL and\nsmb_query_info::output_buffer_length=0, the following would return\n0x10\n\n\tbuffer = memdup_user(arg + sizeof(struct smb_query_info),\n\t\t\t     qi.output_buffer_length);\n\tif (IS_ERR(buffer)) {\n\t\tkfree(vars);\n\t\treturn PTR_ERR(buffer);\n\t}\n\nrather than a valid pointer thus making IS_ERR() check fail.  This\nwould then cause a NULL ptr deference in @buffer when accessing it\nlater in smb2_ioctl_query_ioctl().  While at it, prevent having a\n@buffer smaller than 8 bytes to correctly handle SMB2_SET_INFO\nFileEndOfFileInformation requests when\nsmb_query_info::flags=PASSTHRU_SET_INFO.\n\nHere is a small C reproducer which triggers a NULL ptr in @buffer when\npassing an invalid smb_query_info::flags\n\n\t#include \u003cstdio.h\u003e\n\t#include \u003cstdlib.h\u003e\n\t#include \u003cstdint.h\u003e\n\t#include \u003cunistd.h\u003e\n\t#include \u003cfcntl.h\u003e\n\t#include \u003csys/ioctl.h\u003e\n\n\t#define die(s) perror(s), exit(1)\n\t#define QUERY_INFO 0xc018cf07\n\n\tint main(int argc, char *argv[])\n\t{\n\t\tint fd;\n\n\t\tif (argc \u003c 2)\n\t\t\texit(1);\n\t\tfd = open(argv[1], O_RDONLY);\n\t\tif (fd == -1)\n\t\t\tdie(\"open\");\n\t\tif (ioctl(fd, QUERY_INFO, (uint32_t[]) { 0, 0, 0, 4, 0, 0}) == -1)\n\t\t\tdie(\"ioctl\");\n\t\tclose(fd);\n\t\treturn 0;\n\t}\n\n\tmount.cifs //srv/share /mnt -o ...\n\tgcc repro.c \u0026\u0026 ./a.out /mnt/f0\n\n\t[  114.138620] general protection fault, probably for non-canonical address 0xdffffc0000000000: 0000 [#1] PREEMPT SMP KASAN NOPTI\n\t[  114.139310] KASAN: null-ptr-deref in range [0x0000000000000000-0x0000000000000007]\n\t[  114.139775] CPU: 2 PID: 995 Comm: a.out Not tainted 5.17.0-rc8 #1\n\t[  114.140148] Hardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS rel-1.15.0-0-g2dd4b9b-rebuilt.opensuse.org 04/01/2014\n\t[  114.140818] RIP: 0010:smb2_ioctl_query_info+0x206/0x410 [cifs]\n\t[  114.141221] Code: 00 00 00 00 fc ff df 48 c1 ea 03 80 3c 02 00 0f 85 c8 01 00 00 48 b8 00 00 00 00 00 fc ff df 4c 8b 7b 28 4c 89 fa 48 c1 ea 03 \u003c80\u003e 3c 02 00 0f 85 9c 01 00 00 49 8b 3f e8 58 02 fb ff 48 8b 14 24\n\t[  114.142348] RSP: 0018:ffffc90000b47b00 EFLAGS: 00010256\n\t[  114.142692] RAX: dffffc0000000000 RBX: ffff888115503200 RCX: ffffffffa020580d\n\t[  114.143119] RDX: 0000000000000000 RSI: 0000000000000004 RDI: ffffffffa043a380\n\t[  114.143544] RBP: ffff888115503278 R08: 0000000000000001 R09: 0000000000000003\n\t[  114.143983] R10: fffffbfff4087470 R11: 0000000000000001 R12: ffff888115503288\n\t[  114.144424] R13: 00000000ffffffea R14: ffff888115503228 R15: 0000000000000000\n\t[  114.144852] FS:  00007f7aeabdf740(0000) GS:ffff888151600000(0000) knlGS:0000000000000000\n\t[  114.145338] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n\t[  114.145692] CR2: 00007f7aeacfdf5e CR3: 000000012000e000 CR4: 0000000000350ee0\n\t[  114.146131] Call Trace:\n\t[  114.146291]  \u003cTASK\u003e\n\t[  114.146432]  ? smb2_query_reparse_tag+0x890/0x890 [cifs]\n\t[  114.146800]  ? cifs_mapchar+0x460/0x460 [cifs]\n\t[  114.147121]  ? rcu_read_lock_sched_held+0x3f/0x70\n\t[  114.147412]  ? cifs_strndup_to_utf16+0x15b/0x250 [cifs]\n\t[  114.147775]  ? dentry_path_raw+0xa6/0xf0\n\t[  114.148024]  ? cifs_convert_path_to_utf16+0x198/0x220 [cifs]\n\t[  114.148413]  ? smb2_check_message+0x1080/0x1080 [cifs]\n\t[  114.148766]  ? rcu_read_lock_sched_held+0x3f/0x70\n\t[  114.149065]  cifs_ioctl+0x1577/0x3320 [cifs]\n\t[  114.149371]  ? lock_downgrade+0x6f0/0x6f0\n\t[  114.149631]  ? cifs_readdir+0x2e60/0x2e60 [cifs]\n\t[  114.149956]  ? rcu_read_lock_sched_held+0x3f/0x70\n\t[  114.150250]  ? __rseq_handle_notify_resume+0x80b/0xbe0\n\t[  114.150562]  ? __up_read+0x192/0x710\n\t[  114.150791]  ? __ia32_sys_rseq+0xf0/0xf0\n\t[  114.151025]  ? __x64_sys_openat+0x11f/0x1d0\n\t[  114.151296]  __x64_sys_ioctl+0x127/0x190\n\t[  114.151549]  do_syscall_64+0x3b/0x90\n\t[  114.151768]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n\t[  114.152079] RIP: 0033:0x7f7aead043df\n\t[  114.152306] Code: 00 48 89 44 24 18 31 c0 48 8d 44 24 60 c7 04 24\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49271",
          "url": "https://www.suse.com/security/cve/CVE-2022-49271"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238626 for CVE-2022-49271",
          "url": "https://bugzilla.suse.com/1238626"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49271"
    },
    {
      "cve": "CVE-2022-49272",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49272"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix potential AB/BA lock with buffer_mutex and mmap_lock\n\nsyzbot caught a potential deadlock between the PCM\nruntime-\u003ebuffer_mutex and the mm-\u003emmap_lock.  It was brought by the\nrecent fix to cover the racy read/write and other ioctls, and in that\ncommit, I overlooked a (hopefully only) corner case that may take the\nrevert lock, namely, the OSS mmap.  The OSS mmap operation\nexceptionally allows to re-configure the parameters inside the OSS\nmmap syscall, where mm-\u003emmap_mutex is already held.  Meanwhile, the\ncopy_from/to_user calls at read/write operations also take the\nmm-\u003emmap_lock internally, hence it may lead to a AB/BA deadlock.\n\nA similar problem was already seen in the past and we fixed it with a\nrefcount (in commit b248371628aa).  The former fix covered only the\ncall paths with OSS read/write and OSS ioctls, while we need to cover\nthe concurrent access via both ALSA and OSS APIs now.\n\nThis patch addresses the problem above by replacing the buffer_mutex\nlock in the read/write operations with a refcount similar as we\u0027ve\nused for OSS.  The new field, runtime-\u003ebuffer_accessing, keeps the\nnumber of concurrent read/write operations.  Unlike the former\nbuffer_mutex protection, this protects only around the\ncopy_from/to_user() calls; the other codes are basically protected by\nthe PCM stream lock.  The refcount can be a negative, meaning blocked\nby the ioctls.  If a negative value is seen, the read/write aborts\nwith -EBUSY.  In the ioctl side, OTOH, they check this refcount, too,\nand set to a negative value for blocking unless it\u0027s already being\naccessed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49272",
          "url": "https://www.suse.com/security/cve/CVE-2022-49272"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238272 for CVE-2022-49272",
          "url": "https://bugzilla.suse.com/1238272"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49272"
    },
    {
      "cve": "CVE-2022-49275",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49275"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncan: m_can: m_can_tx_handler(): fix use after free of skb\n\ncan_put_echo_skb() will clone skb then free the skb. Move the\ncan_put_echo_skb() for the m_can version 3.0.x directly before the\nstart of the xmit in hardware, similar to the 3.1.x branch.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49275",
          "url": "https://www.suse.com/security/cve/CVE-2022-49275"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238719 for CVE-2022-49275",
          "url": "https://bugzilla.suse.com/1238719"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238720 for CVE-2022-49275",
          "url": "https://bugzilla.suse.com/1238720"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49275"
    },
    {
      "cve": "CVE-2022-49280",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49280"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFSD: prevent underflow in nfssvc_decode_writeargs()\n\nSmatch complains:\n\n\tfs/nfsd/nfsxdr.c:341 nfssvc_decode_writeargs()\n\twarn: no lower bound on \u0027args-\u003elen\u0027\n\nChange the type to unsigned to prevent this issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49280",
          "url": "https://www.suse.com/security/cve/CVE-2022-49280"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238630 for CVE-2022-49280",
          "url": "https://bugzilla.suse.com/1238630"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49280"
    },
    {
      "cve": "CVE-2022-49281",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49281"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix handlecache and multiuser\n\nIn multiuser each individual user has their own tcon structure for the\nshare and thus their own handle for a cached directory.\nWhen we umount such a share we much make sure to release the pinned down dentry\nfor each such tcon and not just the master tcon.\n\nOtherwise we will get nasty warnings on umount that dentries are still in use:\n[ 3459.590047] BUG: Dentry 00000000115c6f41{i=12000000019d95,n=/}  still in use\\\n (2) [unmount of cifs cifs]\n...\n[ 3459.590492] Call Trace:\n[ 3459.590500]  d_walk+0x61/0x2a0\n[ 3459.590518]  ? shrink_lock_dentry.part.0+0xe0/0xe0\n[ 3459.590526]  shrink_dcache_for_umount+0x49/0x110\n[ 3459.590535]  generic_shutdown_super+0x1a/0x110\n[ 3459.590542]  kill_anon_super+0x14/0x30\n[ 3459.590549]  cifs_kill_sb+0xf5/0x104 [cifs]\n[ 3459.590773]  deactivate_locked_super+0x36/0xa0\n[ 3459.590782]  cleanup_mnt+0x131/0x190\n[ 3459.590789]  task_work_run+0x5c/0x90\n[ 3459.590798]  exit_to_user_mode_loop+0x151/0x160\n[ 3459.590809]  exit_to_user_mode_prepare+0x83/0xd0\n[ 3459.590818]  syscall_exit_to_user_mode+0x12/0x30\n[ 3459.590828]  do_syscall_64+0x48/0x90\n[ 3459.590833]  entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49281",
          "url": "https://www.suse.com/security/cve/CVE-2022-49281"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238635 for CVE-2022-49281",
          "url": "https://bugzilla.suse.com/1238635"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49281"
    },
    {
      "cve": "CVE-2022-49286",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49286"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: use try_get_ops() in tpm-space.c\n\nAs part of the series conversion to remove nested TPM operations:\n\nhttps://lore.kernel.org/all/20190205224723.19671-1-jarkko.sakkinen@linux.intel.com/\n\nexposure of the chip-\u003etpm_mutex was removed from much of the upper\nlevel code.  In this conversion, tpm2_del_space() was missed.  This\ndidn\u0027t matter much because it\u0027s usually called closely after a\nconverted operation, so there\u0027s only a very tiny race window where the\nchip can be removed before the space flushing is done which causes a\nNULL deref on the mutex.  However, there are reports of this window\nbeing hit in practice, so fix this by converting tpm2_del_space() to\nuse tpm_try_get_ops(), which performs all the teardown checks before\nacquring the mutex.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49286",
          "url": "https://www.suse.com/security/cve/CVE-2022-49286"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238647 for CVE-2022-49286",
          "url": "https://bugzilla.suse.com/1238647"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49286"
    },
    {
      "cve": "CVE-2022-49287",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49287"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntpm: fix reference counting for struct tpm_chip\n\nThe following sequence of operations results in a refcount warning:\n\n1. Open device /dev/tpmrm.\n2. Remove module tpm_tis_spi.\n3. Write a TPM command to the file descriptor opened at step 1.\n\n------------[ cut here ]------------\nWARNING: CPU: 3 PID: 1161 at lib/refcount.c:25 kobject_get+0xa0/0xa4\nrefcount_t: addition on 0; use-after-free.\nModules linked in: tpm_tis_spi tpm_tis_core tpm mdio_bcm_unimac brcmfmac\nsha256_generic libsha256 sha256_arm hci_uart btbcm bluetooth cfg80211 vc4\nbrcmutil ecdh_generic ecc snd_soc_core crc32_arm_ce libaes\nraspberrypi_hwmon ac97_bus snd_pcm_dmaengine bcm2711_thermal snd_pcm\nsnd_timer genet snd phy_generic soundcore [last unloaded: spi_bcm2835]\nCPU: 3 PID: 1161 Comm: hold_open Not tainted 5.10.0ls-main-dirty #2\nHardware name: BCM2711\n[\u003cc0410c3c\u003e] (unwind_backtrace) from [\u003cc040b580\u003e] (show_stack+0x10/0x14)\n[\u003cc040b580\u003e] (show_stack) from [\u003cc1092174\u003e] (dump_stack+0xc4/0xd8)\n[\u003cc1092174\u003e] (dump_stack) from [\u003cc0445a30\u003e] (__warn+0x104/0x108)\n[\u003cc0445a30\u003e] (__warn) from [\u003cc0445aa8\u003e] (warn_slowpath_fmt+0x74/0xb8)\n[\u003cc0445aa8\u003e] (warn_slowpath_fmt) from [\u003cc08435d0\u003e] (kobject_get+0xa0/0xa4)\n[\u003cc08435d0\u003e] (kobject_get) from [\u003cbf0a715c\u003e] (tpm_try_get_ops+0x14/0x54 [tpm])\n[\u003cbf0a715c\u003e] (tpm_try_get_ops [tpm]) from [\u003cbf0a7d6c\u003e] (tpm_common_write+0x38/0x60 [tpm])\n[\u003cbf0a7d6c\u003e] (tpm_common_write [tpm]) from [\u003cc05a7ac0\u003e] (vfs_write+0xc4/0x3c0)\n[\u003cc05a7ac0\u003e] (vfs_write) from [\u003cc05a7ee4\u003e] (ksys_write+0x58/0xcc)\n[\u003cc05a7ee4\u003e] (ksys_write) from [\u003cc04001a0\u003e] (ret_fast_syscall+0x0/0x4c)\nException stack(0xc226bfa8 to 0xc226bff0)\nbfa0:                   00000000 000105b4 00000003 beafe664 00000014 00000000\nbfc0: 00000000 000105b4 000103f8 00000004 00000000 00000000 b6f9c000 beafe684\nbfe0: 0000006c beafe648 0001056c b6eb6944\n---[ end trace d4b8409def9b8b1f ]---\n\nThe reason for this warning is the attempt to get the chip-\u003edev reference\nin tpm_common_write() although the reference counter is already zero.\n\nSince commit 8979b02aaf1d (\"tpm: Fix reference count to main device\") the\nextra reference used to prevent a premature zero counter is never taken,\nbecause the required TPM_CHIP_FLAG_TPM2 flag is never set.\n\nFix this by moving the TPM 2 character device handling from\ntpm_chip_alloc() to tpm_add_char_device() which is called at a later point\nin time when the flag has been set in case of TPM2.\n\nCommit fdc915f7f719 (\"tpm: expose spaces via a device link /dev/tpmrm\u003cn\u003e\")\nalready introduced function tpm_devs_release() to release the extra\nreference but did not implement the required put on chip-\u003edevs that results\nin the call of this function.\n\nFix this by putting chip-\u003edevs in tpm_chip_unregister().\n\nFinally move the new implementation for the TPM 2 handling into a new\nfunction to avoid multiple checks for the TPM_CHIP_FLAG_TPM2 flag in the\ngood case and error cases.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49287",
          "url": "https://www.suse.com/security/cve/CVE-2022-49287"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238276 for CVE-2022-49287",
          "url": "https://bugzilla.suse.com/1238276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49287"
    },
    {
      "cve": "CVE-2022-49288",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49288"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix races among concurrent prealloc proc writes\n\nWe have no protection against concurrent PCM buffer preallocation\nchanges via proc files, and it may potentially lead to UAF or some\nweird problem.  This patch applies the PCM open_mutex to the proc\nwrite operation for avoiding the racy proc writes and the PCM stream\nopen (and further operations).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49288",
          "url": "https://www.suse.com/security/cve/CVE-2022-49288"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238271 for CVE-2022-49288",
          "url": "https://bugzilla.suse.com/1238271"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49288"
    },
    {
      "cve": "CVE-2022-49291",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49291"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: Fix races among concurrent hw_params and hw_free calls\n\nCurrently we have neither proper check nor protection against the\nconcurrent calls of PCM hw_params and hw_free ioctls, which may result\nin a UAF.  Since the existing PCM stream lock can\u0027t be used for\nprotecting the whole ioctl operations, we need a new mutex to protect\nthose racy calls.\n\nThis patch introduced a new mutex, runtime-\u003ebuffer_mutex, and applies\nit to both hw_params and hw_free ioctl code paths.  Along with it, the\nboth functions are slightly modified (the mmap_count check is moved\ninto the state-check block) for code simplicity.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49291",
          "url": "https://www.suse.com/security/cve/CVE-2022-49291"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238705 for CVE-2022-49291",
          "url": "https://bugzilla.suse.com/1238705"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238706 for CVE-2022-49291",
          "url": "https://bugzilla.suse.com/1238706"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49291"
    },
    {
      "cve": "CVE-2022-49292",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49292"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: oss: Fix PCM OSS buffer allocation overflow\n\nWe\u0027ve got syzbot reports hitting INT_MAX overflow at vmalloc()\nallocation that is called from snd_pcm_plug_alloc().  Although we\napply the restrictions to input parameters, it\u0027s based only on the\nhw_params of the underlying PCM device.  Since the PCM OSS layer\nallocates a temporary buffer for the data conversion, the size may\nbecome unexpectedly large when more channels or higher rates is given;\nin the reported case, it went over INT_MAX, hence it hits WARN_ON().\n\nThis patch is an attempt to avoid such an overflow and an allocation\nfor too large buffers.  First off, it adds the limit of 1MB as the\nupper bound for period bytes.  This must be large enough for all use\ncases, and we really don\u0027t want to handle a larger temporary buffer\nthan this size.  The size check is performed at two places, where the\noriginal period bytes is calculated and where the plugin buffer size\nis calculated.\n\nIn addition, the driver uses array_size() and array3_size() for\nmultiplications to catch overflows for the converted period size and\nbuffer bytes.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49292",
          "url": "https://www.suse.com/security/cve/CVE-2022-49292"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238625 for CVE-2022-49292",
          "url": "https://bugzilla.suse.com/1238625"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49292"
    },
    {
      "cve": "CVE-2022-49293",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49293"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetfilter: nf_tables: initialize registers in nft_do_chain()\n\nInitialize registers to avoid stack leak into userspace.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49293",
          "url": "https://www.suse.com/security/cve/CVE-2022-49293"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239454 for CVE-2022-49293",
          "url": "https://bugzilla.suse.com/1239454"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49293"
    },
    {
      "cve": "CVE-2022-49295",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49295"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: call genl_unregister_family() first in nbd_cleanup()\n\nOtherwise there may be race between module removal and the handling of\nnetlink command, which can lead to the oops as shown below:\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000098\n  Oops: 0002 [#1] SMP PTI\n  CPU: 1 PID: 31299 Comm: nbd-client Tainted: G            E     5.14.0-rc4\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n  RIP: 0010:down_write+0x1a/0x50\n  Call Trace:\n   start_creating+0x89/0x130\n   debugfs_create_dir+0x1b/0x130\n   nbd_start_device+0x13d/0x390 [nbd]\n   nbd_genl_connect+0x42f/0x748 [nbd]\n   genl_family_rcv_msg_doit.isra.0+0xec/0x150\n   genl_rcv_msg+0xe5/0x1e0\n   netlink_rcv_skb+0x55/0x100\n   genl_rcv+0x29/0x40\n   netlink_unicast+0x1a8/0x250\n   netlink_sendmsg+0x21b/0x430\n   ____sys_sendmsg+0x2a4/0x2d0\n   ___sys_sendmsg+0x81/0xc0\n   __sys_sendmsg+0x62/0xb0\n   __x64_sys_sendmsg+0x1f/0x30\n   do_syscall_64+0x3b/0xc0\n   entry_SYSCALL_64_after_hwframe+0x44/0xae\n  Modules linked in: nbd(E-)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49295",
          "url": "https://www.suse.com/security/cve/CVE-2022-49295"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238707 for CVE-2022-49295",
          "url": "https://bugzilla.suse.com/1238707"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49295"
    },
    {
      "cve": "CVE-2022-49297",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49297"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: fix io hung while disconnecting device\n\nIn our tests, \"qemu-nbd\" triggers a io hung:\n\nINFO: task qemu-nbd:11445 blocked for more than 368 seconds.\n      Not tainted 5.18.0-rc3-next-20220422-00003-g2176915513ca #884\n\"echo 0 \u003e /proc/sys/kernel/hung_task_timeout_secs\" disables this message.\ntask:qemu-nbd        state:D stack:    0 pid:11445 ppid:     1 flags:0x00000000\nCall Trace:\n \u003cTASK\u003e\n __schedule+0x480/0x1050\n ? _raw_spin_lock_irqsave+0x3e/0xb0\n schedule+0x9c/0x1b0\n blk_mq_freeze_queue_wait+0x9d/0xf0\n ? ipi_rseq+0x70/0x70\n blk_mq_freeze_queue+0x2b/0x40\n nbd_add_socket+0x6b/0x270 [nbd]\n nbd_ioctl+0x383/0x510 [nbd]\n blkdev_ioctl+0x18e/0x3e0\n __x64_sys_ioctl+0xac/0x120\n do_syscall_64+0x35/0x80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\nRIP: 0033:0x7fd8ff706577\nRSP: 002b:00007fd8fcdfebf8 EFLAGS: 00000246 ORIG_RAX: 0000000000000010\nRAX: ffffffffffffffda RBX: 0000000040000000 RCX: 00007fd8ff706577\nRDX: 000000000000000d RSI: 000000000000ab00 RDI: 000000000000000f\nRBP: 000000000000000f R08: 000000000000fbe8 R09: 000055fe497c62b0\nR10: 00000002aff20000 R11: 0000000000000246 R12: 000000000000006d\nR13: 0000000000000000 R14: 00007ffe82dc5e70 R15: 00007fd8fcdff9c0\n\n\"qemu-ndb -d\" will call ioctl \u0027NBD_DISCONNECT\u0027 first, however, following\nmessage was found:\n\nblock nbd0: Send disconnect failed -32\n\nWhich indicate that something is wrong with the server. Then,\n\"qemu-nbd -d\" will call ioctl \u0027NBD_CLEAR_SOCK\u0027, however ioctl can\u0027t clear\nrequests after commit 2516ab1543fd(\"nbd: only clear the queue on device\nteardown\"). And in the meantime, request can\u0027t complete through timeout\nbecause nbd_xmit_timeout() will always return \u0027BLK_EH_RESET_TIMER\u0027, which\nmeans such request will never be completed in this situation.\n\nNow that the flag \u0027NBD_CMD_INFLIGHT\u0027 can make sure requests won\u0027t\ncomplete multiple times, switch back to call nbd_clear_sock() in\nnbd_clear_sock_ioctl(), so that inflight requests can be cleared.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49297",
          "url": "https://www.suse.com/security/cve/CVE-2022-49297"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238469 for CVE-2022-49297",
          "url": "https://bugzilla.suse.com/1238469"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49297"
    },
    {
      "cve": "CVE-2022-49300",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49300"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnbd: fix race between nbd_alloc_config() and module removal\n\nWhen nbd module is being removing, nbd_alloc_config() may be\ncalled concurrently by nbd_genl_connect(), although try_module_get()\nwill return false, but nbd_alloc_config() doesn\u0027t handle it.\n\nThe race may lead to the leak of nbd_config and its related\nresources (e.g, recv_workq) and oops in nbd_read_stat() due\nto the unload of nbd module as shown below:\n\n  BUG: kernel NULL pointer dereference, address: 0000000000000040\n  Oops: 0000 [#1] SMP PTI\n  CPU: 5 PID: 13840 Comm: kworker/u17:33 Not tainted 5.14.0+ #1\n  Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\n  Workqueue: knbd16-recv recv_work [nbd]\n  RIP: 0010:nbd_read_stat.cold+0x130/0x1a4 [nbd]\n  Call Trace:\n   recv_work+0x3b/0xb0 [nbd]\n   process_one_work+0x1ed/0x390\n   worker_thread+0x4a/0x3d0\n   kthread+0x12a/0x150\n   ret_from_fork+0x22/0x30\n\nFixing it by checking the return value of try_module_get()\nin nbd_alloc_config(). As nbd_alloc_config() may return ERR_PTR(-ENODEV),\nassign nbd-\u003econfig only when nbd_alloc_config() succeeds to ensure\nthe value of nbd-\u003econfig is binary (valid or NULL).\n\nAlso adding a debug message to check the reference counter\nof nbd_config during module removal.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49300",
          "url": "https://www.suse.com/security/cve/CVE-2022-49300"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238183 for CVE-2022-49300",
          "url": "https://bugzilla.suse.com/1238183"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49300"
    },
    {
      "cve": "CVE-2022-49308",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49308"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nextcon: Modify extcon device to be created after driver data is set\n\nCurrently, someone can invoke the sysfs such as state_show()\nintermittently before dev_set_drvdata() is done.\nAnd it can be a cause of kernel Oops because of edev is Null at that time.\nSo modified the driver registration to after setting drviver data.\n\n- Oops\u0027s backtrace.\n\nBacktrace:\n[\u003cc067865c\u003e] (state_show) from [\u003cc05222e8\u003e] (dev_attr_show)\n[\u003cc05222c0\u003e] (dev_attr_show) from [\u003cc02c66e0\u003e] (sysfs_kf_seq_show)\n[\u003cc02c6648\u003e] (sysfs_kf_seq_show) from [\u003cc02c496c\u003e] (kernfs_seq_show)\n[\u003cc02c4938\u003e] (kernfs_seq_show) from [\u003cc025e2a0\u003e] (seq_read)\n[\u003cc025e11c\u003e] (seq_read) from [\u003cc02c50a0\u003e] (kernfs_fop_read)\n[\u003cc02c5064\u003e] (kernfs_fop_read) from [\u003cc0231cac\u003e] (__vfs_read)\n[\u003cc0231c5c\u003e] (__vfs_read) from [\u003cc0231ee0\u003e] (vfs_read)\n[\u003cc0231e34\u003e] (vfs_read) from [\u003cc0232464\u003e] (ksys_read)\n[\u003cc02323f0\u003e] (ksys_read) from [\u003cc02324fc\u003e] (sys_read)\n[\u003cc02324e4\u003e] (sys_read) from [\u003cc00091d0\u003e] (__sys_trace_return)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49308",
          "url": "https://www.suse.com/security/cve/CVE-2022-49308"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238654 for CVE-2022-49308",
          "url": "https://bugzilla.suse.com/1238654"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49308"
    },
    {
      "cve": "CVE-2022-49313",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49313"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrivers: usb: host: Fix deadlock in oxu_bus_suspend()\n\nThere is a deadlock in oxu_bus_suspend(), which is shown below:\n\n   (Thread 1)              |      (Thread 2)\n                           | timer_action()\noxu_bus_suspend()          |  mod_timer()\n spin_lock_irq() //(1)     |  (wait a time)\n ...                       | oxu_watchdog()\n del_timer_sync()          |  spin_lock_irq() //(2)\n (wait timer to stop)      |  ...\n\nWe hold oxu-\u003elock in position (1) of thread 1, and use\ndel_timer_sync() to wait timer to stop, but timer handler\nalso need oxu-\u003elock in position (2) of thread 2. As a result,\noxu_bus_suspend() will block forever.\n\nThis patch extracts del_timer_sync() from the protection of\nspin_lock_irq(), which could let timer handler to obtain\nthe needed lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49313",
          "url": "https://www.suse.com/security/cve/CVE-2022-49313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238633 for CVE-2022-49313",
          "url": "https://bugzilla.suse.com/1238633"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49313"
    },
    {
      "cve": "CVE-2022-49321",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49321"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxprtrdma: treat all calls not a bcall when bc_serv is NULL\n\nWhen a rdma server returns a fault format reply, nfs v3 client may\ntreats it as a bcall when bc service is not exist.\n\nThe debug message at rpcrdma_bc_receive_call are,\n\n[56579.837169] RPC:       rpcrdma_bc_receive_call: callback XID\n00000001, length=20\n[56579.837174] RPC:       rpcrdma_bc_receive_call: 00 00 00 01 00 00 00\n00 00 00 00 00 00 00 00 00 00 00 00 04\n\nAfter that, rpcrdma_bc_receive_call will meets NULL pointer as,\n\n[  226.057890] BUG: unable to handle kernel NULL pointer dereference at\n00000000000000c8\n...\n[  226.058704] RIP: 0010:_raw_spin_lock+0xc/0x20\n...\n[  226.059732] Call Trace:\n[  226.059878]  rpcrdma_bc_receive_call+0x138/0x327 [rpcrdma]\n[  226.060011]  __ib_process_cq+0x89/0x170 [ib_core]\n[  226.060092]  ib_cq_poll_work+0x26/0x80 [ib_core]\n[  226.060257]  process_one_work+0x1a7/0x360\n[  226.060367]  ? create_worker+0x1a0/0x1a0\n[  226.060440]  worker_thread+0x30/0x390\n[  226.060500]  ? create_worker+0x1a0/0x1a0\n[  226.060574]  kthread+0x116/0x130\n[  226.060661]  ? kthread_flush_work_fn+0x10/0x10\n[  226.060724]  ret_from_fork+0x35/0x40\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49321",
          "url": "https://www.suse.com/security/cve/CVE-2022-49321"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238373 for CVE-2022-49321",
          "url": "https://bugzilla.suse.com/1238373"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49321"
    },
    {
      "cve": "CVE-2022-49322",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49322"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Fix sleeping function called from invalid context on RT kernel\n\nWhen setting bootparams=\"trace_event=initcall:initcall_start tp_printk=1\" in the\ncmdline, the output_printk() was called, and the spin_lock_irqsave() was called in the\natomic and irq disable interrupt context suitation. On the PREEMPT_RT kernel,\nthese locks are replaced with sleepable rt-spinlock, so the stack calltrace will\nbe triggered.\nFix it by raw_spin_lock_irqsave when PREEMPT_RT and \"trace_event=initcall:initcall_start\ntp_printk=1\" enabled.\n\n BUG: sleeping function called from invalid context at kernel/locking/spinlock_rt.c:46\n in_atomic(): 1, irqs_disabled(): 0, non_block: 0, pid: 1, name: swapper/0\n preempt_count: 2, expected: 0\n RCU nest depth: 0, expected: 0\n Preemption disabled at:\n [\u003cffffffff8992303e\u003e] try_to_wake_up+0x7e/0xba0\n CPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.17.1-rt17+ #19 34c5812404187a875f32bee7977f7367f9679ea7\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-2 04/01/2014\n Call Trace:\n  \u003cTASK\u003e\n  dump_stack_lvl+0x60/0x8c\n  dump_stack+0x10/0x12\n  __might_resched.cold+0x11d/0x155\n  rt_spin_lock+0x40/0x70\n  trace_event_buffer_commit+0x2fa/0x4c0\n  ? map_vsyscall+0x93/0x93\n  trace_event_raw_event_initcall_start+0xbe/0x110\n  ? perf_trace_initcall_finish+0x210/0x210\n  ? probe_sched_wakeup+0x34/0x40\n  ? ttwu_do_wakeup+0xda/0x310\n  ? trace_hardirqs_on+0x35/0x170\n  ? map_vsyscall+0x93/0x93\n  do_one_initcall+0x217/0x3c0\n  ? trace_event_raw_event_initcall_level+0x170/0x170\n  ? push_cpu_stop+0x400/0x400\n  ? cblist_init_generic+0x241/0x290\n  kernel_init_freeable+0x1ac/0x347\n  ? _raw_spin_unlock_irq+0x65/0x80\n  ? rest_init+0xf0/0xf0\n  kernel_init+0x1e/0x150\n  ret_from_fork+0x22/0x30\n  \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49322",
          "url": "https://www.suse.com/security/cve/CVE-2022-49322"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238396 for CVE-2022-49322",
          "url": "https://bugzilla.suse.com/1238396"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49322"
    },
    {
      "cve": "CVE-2022-49330",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49330"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: fix tcp_mtup_probe_success vs wrong snd_cwnd\n\nsyzbot got a new report [1] finally pointing to a very old bug,\nadded in initial support for MTU probing.\n\ntcp_mtu_probe() has checks about starting an MTU probe if\ntcp_snd_cwnd(tp) \u003e= 11.\n\nBut nothing prevents tcp_snd_cwnd(tp) to be reduced later\nand before the MTU probe succeeds.\n\nThis bug would lead to potential zero-divides.\n\nDebugging added in commit 40570375356c (\"tcp: add accessors\nto read/set tp-\u003esnd_cwnd\") has paid off :)\n\nWhile we are at it, address potential overflows in this code.\n\n[1]\nWARNING: CPU: 1 PID: 14132 at include/net/tcp.h:1219 tcp_mtup_probe_success+0x366/0x570 net/ipv4/tcp_input.c:2712\nModules linked in:\nCPU: 1 PID: 14132 Comm: syz-executor.2 Not tainted 5.18.0-syzkaller-07857-gbabf0bb978e3 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011\nRIP: 0010:tcp_snd_cwnd_set include/net/tcp.h:1219 [inline]\nRIP: 0010:tcp_mtup_probe_success+0x366/0x570 net/ipv4/tcp_input.c:2712\nCode: 74 08 48 89 ef e8 da 80 17 f9 48 8b 45 00 65 48 ff 80 80 03 00 00 48 83 c4 30 5b 41 5c 41 5d 41 5e 41 5f 5d c3 e8 aa b0 c5 f8 \u003c0f\u003e 0b e9 16 fe ff ff 48 8b 4c 24 08 80 e1 07 38 c1 0f 8c c7 fc ff\nRSP: 0018:ffffc900079e70f8 EFLAGS: 00010287\nRAX: ffffffff88c0f7f6 RBX: ffff8880756e7a80 RCX: 0000000000040000\nRDX: ffffc9000c6c4000 RSI: 0000000000031f9e RDI: 0000000000031f9f\nRBP: 0000000000000000 R08: ffffffff88c0f606 R09: ffffc900079e7520\nR10: ffffed101011226d R11: 1ffff1101011226c R12: 1ffff1100eadcf50\nR13: ffff8880756e72c0 R14: 1ffff1100eadcf89 R15: dffffc0000000000\nFS:  00007f643236e700(0000) GS:ffff8880b9b00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f1ab3f1e2a0 CR3: 0000000064fe7000 CR4: 00000000003506e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n tcp_clean_rtx_queue+0x223a/0x2da0 net/ipv4/tcp_input.c:3356\n tcp_ack+0x1962/0x3c90 net/ipv4/tcp_input.c:3861\n tcp_rcv_established+0x7c8/0x1ac0 net/ipv4/tcp_input.c:5973\n tcp_v6_do_rcv+0x57b/0x1210 net/ipv6/tcp_ipv6.c:1476\n sk_backlog_rcv include/net/sock.h:1061 [inline]\n __release_sock+0x1d8/0x4c0 net/core/sock.c:2849\n release_sock+0x5d/0x1c0 net/core/sock.c:3404\n sk_stream_wait_memory+0x700/0xdc0 net/core/stream.c:145\n tcp_sendmsg_locked+0x111d/0x3fc0 net/ipv4/tcp.c:1410\n tcp_sendmsg+0x2c/0x40 net/ipv4/tcp.c:1448\n sock_sendmsg_nosec net/socket.c:714 [inline]\n sock_sendmsg net/socket.c:734 [inline]\n __sys_sendto+0x439/0x5c0 net/socket.c:2119\n __do_sys_sendto net/socket.c:2131 [inline]\n __se_sys_sendto net/socket.c:2127 [inline]\n __x64_sys_sendto+0xda/0xf0 net/socket.c:2127\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x2b/0x70 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x46/0xb0\nRIP: 0033:0x7f6431289109\nCode: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 \u003c48\u003e 3d 01 f0 ff ff 73 01 c3 48 c7 c1 b8 ff ff ff f7 d8 64 89 01 48\nRSP: 002b:00007f643236e168 EFLAGS: 00000246 ORIG_RAX: 000000000000002c\nRAX: ffffffffffffffda RBX: 00007f643139c100 RCX: 00007f6431289109\nRDX: 00000000d0d0c2ac RSI: 0000000020000080 RDI: 000000000000000a\nRBP: 00007f64312e308d R08: 0000000000000000 R09: 0000000000000000\nR10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000000\nR13: 00007fff372533af R14: 00007f643236e300 R15: 0000000000022000",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49330",
          "url": "https://www.suse.com/security/cve/CVE-2022-49330"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238378 for CVE-2022-49330",
          "url": "https://bugzilla.suse.com/1238378"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49330"
    },
    {
      "cve": "CVE-2022-49331",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49331"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfc: st21nfca: fix memory leaks in EVT_TRANSACTION handling\n\nError paths do not free previously allocated memory. Add devm_kfree() to\nthose failure paths.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49331",
          "url": "https://www.suse.com/security/cve/CVE-2022-49331"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237813 for CVE-2022-49331",
          "url": "https://bugzilla.suse.com/1237813"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49331"
    },
    {
      "cve": "CVE-2022-49332",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49332"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: lpfc: Address NULL pointer dereference after starget_to_rport()\n\nCalls to starget_to_rport() may return NULL.  Add check for NULL rport\nbefore dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49332",
          "url": "https://www.suse.com/security/cve/CVE-2022-49332"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238236 for CVE-2022-49332",
          "url": "https://bugzilla.suse.com/1238236"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49332"
    },
    {
      "cve": "CVE-2022-49337",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49337"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nocfs2: dlmfs: fix error handling of user_dlm_destroy_lock\n\nWhen user_dlm_destroy_lock failed, it didn\u0027t clean up the flags it set\nbefore exit.  For USER_LOCK_IN_TEARDOWN, if this function fails because of\nlock is still in used, next time when unlink invokes this function, it\nwill return succeed, and then unlink will remove inode and dentry if lock\nis not in used(file closed), but the dlm lock is still linked in dlm lock\nresource, then when bast come in, it will trigger a panic due to\nuser-after-free.  See the following panic call trace.  To fix this,\nUSER_LOCK_IN_TEARDOWN should be reverted if fail.  And also error should\nbe returned if USER_LOCK_IN_TEARDOWN is set to let user know that unlink\nfail.\n\nFor the case of ocfs2_dlm_unlock failure, besides USER_LOCK_IN_TEARDOWN,\nUSER_LOCK_BUSY is also required to be cleared.  Even though spin lock is\nreleased in between, but USER_LOCK_IN_TEARDOWN is still set, for\nUSER_LOCK_BUSY, if before every place that waits on this flag,\nUSER_LOCK_IN_TEARDOWN is checked to bail out, that will make sure no flow\nwaits on the busy flag set by user_dlm_destroy_lock(), then we can\nsimplely revert USER_LOCK_BUSY when ocfs2_dlm_unlock fails.  Fix\nuser_dlm_cluster_lock() which is the only function not following this.\n\n[  941.336392] (python,26174,16):dlmfs_unlink:562 ERROR: unlink\n004fb0000060000b5a90b8c847b72e1, error -16 from destroy\n[  989.757536] ------------[ cut here ]------------\n[  989.757709] kernel BUG at fs/ocfs2/dlmfs/userdlm.c:173!\n[  989.757876] invalid opcode: 0000 [#1] SMP\n[  989.758027] Modules linked in: ksplice_2zhuk2jr_ib_ipoib_new(O)\nksplice_2zhuk2jr(O) mptctl mptbase xen_netback xen_blkback xen_gntalloc\nxen_gntdev xen_evtchn cdc_ether usbnet mii ocfs2 jbd2 rpcsec_gss_krb5\nauth_rpcgss nfsv4 nfsv3 nfs_acl nfs fscache lockd grace ocfs2_dlmfs\nocfs2_stack_o2cb ocfs2_dlm ocfs2_nodemanager ocfs2_stackglue configfs bnx2fc\nfcoe libfcoe libfc scsi_transport_fc sunrpc ipmi_devintf bridge stp llc\nrds_rdma rds bonding ib_sdp ib_ipoib rdma_ucm ib_ucm ib_uverbs ib_umad\nrdma_cm ib_cm iw_cm falcon_lsm_serviceable(PE) falcon_nf_netcontain(PE)\nmlx4_vnic falcon_kal(E) falcon_lsm_pinned_13402(E) mlx4_ib ib_sa ib_mad\nib_core ib_addr xenfs xen_privcmd dm_multipath iTCO_wdt iTCO_vendor_support\npcspkr sb_edac edac_core i2c_i801 lpc_ich mfd_core ipmi_ssif i2c_core ipmi_si\nipmi_msghandler\n[  989.760686]  ioatdma sg ext3 jbd mbcache sd_mod ahci libahci ixgbe dca ptp\npps_core vxlan udp_tunnel ip6_udp_tunnel megaraid_sas mlx4_core crc32c_intel\nbe2iscsi bnx2i cnic uio cxgb4i cxgb4 cxgb3i libcxgbi ipv6 cxgb3 mdio\nlibiscsi_tcp qla4xxx iscsi_boot_sysfs libiscsi scsi_transport_iscsi wmi\ndm_mirror dm_region_hash dm_log dm_mod [last unloaded:\nksplice_2zhuk2jr_ib_ipoib_old]\n[  989.761987] CPU: 10 PID: 19102 Comm: dlm_thread Tainted: P           OE\n4.1.12-124.57.1.el6uek.x86_64 #2\n[  989.762290] Hardware name: Oracle Corporation ORACLE SERVER\nX5-2/ASM,MOTHERBOARD,1U, BIOS 30350100 06/17/2021\n[  989.762599] task: ffff880178af6200 ti: ffff88017f7c8000 task.ti:\nffff88017f7c8000\n[  989.762848] RIP: e030:[\u003cffffffffc07d4316\u003e]  [\u003cffffffffc07d4316\u003e]\n__user_dlm_queue_lockres.part.4+0x76/0x80 [ocfs2_dlmfs]\n[  989.763185] RSP: e02b:ffff88017f7cbcb8  EFLAGS: 00010246\n[  989.763353] RAX: 0000000000000000 RBX: ffff880174d48008 RCX:\n0000000000000003\n[  989.763565] RDX: 0000000000120012 RSI: 0000000000000003 RDI:\nffff880174d48170\n[  989.763778] RBP: ffff88017f7cbcc8 R08: ffff88021f4293b0 R09:\n0000000000000000\n[  989.763991] R10: ffff880179c8c000 R11: 0000000000000003 R12:\nffff880174d48008\n[  989.764204] R13: 0000000000000003 R14: ffff880179c8c000 R15:\nffff88021db7a000\n[  989.764422] FS:  0000000000000000(0000) GS:ffff880247480000(0000)\nknlGS:ffff880247480000\n[  989.764685] CS:  e033 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  989.764865] CR2: ffff8000007f6800 CR3: 0000000001ae0000 CR4:\n0000000000042660\n[  989.765081] Stack:\n[  989.765167]  00000000000\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49337",
          "url": "https://www.suse.com/security/cve/CVE-2022-49337"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238376 for CVE-2022-49337",
          "url": "https://bugzilla.suse.com/1238376"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49337"
    },
    {
      "cve": "CVE-2022-49343",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49343"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: avoid cycles in directory h-tree\n\nA maliciously corrupted filesystem can contain cycles in the h-tree\nstored inside a directory. That can easily lead to the kernel corrupting\ntree nodes that were already verified under its hands while doing a node\nsplit and consequently accessing unallocated memory. Fix the problem by\nverifying traversed block numbers are unique.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49343",
          "url": "https://www.suse.com/security/cve/CVE-2022-49343"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238382 for CVE-2022-49343",
          "url": "https://bugzilla.suse.com/1238382"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49343"
    },
    {
      "cve": "CVE-2022-49344",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49344"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\naf_unix: Fix a data-race in unix_dgram_peer_wake_me().\n\nunix_dgram_poll() calls unix_dgram_peer_wake_me() without `other`\u0027s\nlock held and check if its receive queue is full.  Here we need to\nuse unix_recvq_full_lockless() instead of unix_recvq_full(), otherwise\nKCSAN will report a data-race.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49344",
          "url": "https://www.suse.com/security/cve/CVE-2022-49344"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237988 for CVE-2022-49344",
          "url": "https://bugzilla.suse.com/1237988"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49344"
    },
    {
      "cve": "CVE-2022-49347",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49347"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug_on in ext4_writepages\n\nwe got issue as follows:\nEXT4-fs error (device loop0): ext4_mb_generate_buddy:1141: group 0, block bitmap and bg descriptor inconsistent: 25 vs 31513 free cls\n------------[ cut here ]------------\nkernel BUG at fs/ext4/inode.c:2708!\ninvalid opcode: 0000 [#1] PREEMPT SMP KASAN PTI\nCPU: 2 PID: 2147 Comm: rep Not tainted 5.18.0-rc2-next-20220413+ #155\nRIP: 0010:ext4_writepages+0x1977/0x1c10\nRSP: 0018:ffff88811d3e7880 EFLAGS: 00010246\nRAX: 0000000000000000 RBX: 0000000000000001 RCX: ffff88811c098000\nRDX: 0000000000000000 RSI: ffff88811c098000 RDI: 0000000000000002\nRBP: ffff888128140f50 R08: ffffffffb1ff6387 R09: 0000000000000000\nR10: 0000000000000007 R11: ffffed10250281ea R12: 0000000000000001\nR13: 00000000000000a4 R14: ffff88811d3e7bb8 R15: ffff888128141028\nFS:  00007f443aed9740(0000) GS:ffff8883aef00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020007200 CR3: 000000011c2a4000 CR4: 00000000000006e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n do_writepages+0x130/0x3a0\n filemap_fdatawrite_wbc+0x83/0xa0\n filemap_flush+0xab/0xe0\n ext4_alloc_da_blocks+0x51/0x120\n __ext4_ioctl+0x1534/0x3210\n __x64_sys_ioctl+0x12c/0x170\n do_syscall_64+0x3b/0x90\n\nIt may happen as follows:\n1. write inline_data inode\nvfs_write\n  new_sync_write\n    ext4_file_write_iter\n      ext4_buffered_write_iter\n        generic_perform_write\n          ext4_da_write_begin\n            ext4_da_write_inline_data_begin -\u003e If inline data size too\n            small will allocate block to write, then mapping will has\n            dirty page\n                ext4_da_convert_inline_data_to_extent -\u003eclear EXT4_STATE_MAY_INLINE_DATA\n2. fallocate\ndo_vfs_ioctl\n  ioctl_preallocate\n    vfs_fallocate\n      ext4_fallocate\n        ext4_convert_inline_data\n          ext4_convert_inline_data_nolock\n            ext4_map_blocks -\u003e fail will goto restore data\n            ext4_restore_inline_data\n              ext4_create_inline_data\n              ext4_write_inline_data\n              ext4_set_inode_state -\u003e set inode EXT4_STATE_MAY_INLINE_DATA\n3. writepages\n__ext4_ioctl\n  ext4_alloc_da_blocks\n    filemap_flush\n      filemap_fdatawrite_wbc\n        do_writepages\n          ext4_writepages\n            if (ext4_has_inline_data(inode))\n              BUG_ON(ext4_test_inode_state(inode, EXT4_STATE_MAY_INLINE_DATA))\n\nThe root cause of this issue is we destory inline data until call\next4_writepages under delay allocation mode.  But there maybe already\nconvert from inline to extent.  To solve this issue, we call\nfilemap_flush first..",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49347",
          "url": "https://www.suse.com/security/cve/CVE-2022-49347"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238393 for CVE-2022-49347",
          "url": "https://bugzilla.suse.com/1238393"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49347"
    },
    {
      "cve": "CVE-2022-49349",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49349"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix use-after-free in ext4_rename_dir_prepare\n\nWe got issue as follows:\nEXT4-fs (loop0): mounted filesystem without journal. Opts: ,errors=continue\next4_get_first_dir_block: bh-\u003eb_data=0xffff88810bee6000 len=34478\next4_get_first_dir_block: *parent_de=0xffff88810beee6ae bh-\u003eb_data=0xffff88810bee6000\next4_rename_dir_prepare: [1] parent_de=0xffff88810beee6ae\n==================================================================\nBUG: KASAN: use-after-free in ext4_rename_dir_prepare+0x152/0x220\nRead of size 4 at addr ffff88810beee6ae by task rep/1895\n\nCPU: 13 PID: 1895 Comm: rep Not tainted 5.10.0+ #241\nCall Trace:\n dump_stack+0xbe/0xf9\n print_address_description.constprop.0+0x1e/0x220\n kasan_report.cold+0x37/0x7f\n ext4_rename_dir_prepare+0x152/0x220\n ext4_rename+0xf44/0x1ad0\n ext4_rename2+0x11c/0x170\n vfs_rename+0xa84/0x1440\n do_renameat2+0x683/0x8f0\n __x64_sys_renameat+0x53/0x60\n do_syscall_64+0x33/0x40\n entry_SYSCALL_64_after_hwframe+0x44/0xa9\nRIP: 0033:0x7f45a6fc41c9\nRSP: 002b:00007ffc5a470218 EFLAGS: 00000246 ORIG_RAX: 0000000000000108\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f45a6fc41c9\nRDX: 0000000000000005 RSI: 0000000020000180 RDI: 0000000000000005\nRBP: 00007ffc5a470240 R08: 00007ffc5a470160 R09: 0000000020000080\nR10: 00000000200001c0 R11: 0000000000000246 R12: 0000000000400bb0\nR13: 00007ffc5a470320 R14: 0000000000000000 R15: 0000000000000000\n\nThe buggy address belongs to the page:\npage:00000000440015ce refcount:0 mapcount:0 mapping:0000000000000000 index:0x1 pfn:0x10beee\nflags: 0x200000000000000()\nraw: 0200000000000000 ffffea00043ff4c8 ffffea0004325608 0000000000000000\nraw: 0000000000000001 0000000000000000 00000000ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n ffff88810beee580: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n ffff88810beee600: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n\u003effff88810beee680: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n                                  ^\n ffff88810beee700: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n ffff88810beee780: ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff\n==================================================================\nDisabling lock debugging due to kernel taint\next4_rename_dir_prepare: [2] parent_de-\u003einode=3537895424\next4_rename_dir_prepare: [3] dir=0xffff888124170140\next4_rename_dir_prepare: [4] ino=2\next4_rename_dir_prepare: ent-\u003edir-\u003ei_ino=2 parent=-757071872\n\nReason is first directory entry which \u0027rec_len\u0027 is 34478, then will get illegal\nparent entry. Now, we do not check directory entry after read directory block\nin \u0027ext4_get_first_dir_block\u0027.\nTo solve this issue, check directory entry in \u0027ext4_get_first_dir_block\u0027.\n\n[ Trigger an ext4_error() instead of just warning if the directory is\n  missing a \u0027.\u0027 or \u0027..\u0027 entry.   Also make sure we return an error code\n  if the file system is corrupted.  -TYT ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49349",
          "url": "https://www.suse.com/security/cve/CVE-2022-49349"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238372 for CVE-2022-49349",
          "url": "https://bugzilla.suse.com/1238372"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49349"
    },
    {
      "cve": "CVE-2022-49367",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49367"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: dsa: mv88e6xxx: Fix refcount leak in mv88e6xxx_mdios_register\n\nof_get_child_by_name() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\n\nmv88e6xxx_mdio_register() pass the device node to of_mdiobus_register().\nWe don\u0027t need the device node after it.\n\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49367",
          "url": "https://www.suse.com/security/cve/CVE-2022-49367"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238447 for CVE-2022-49367",
          "url": "https://bugzilla.suse.com/1238447"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49367"
    },
    {
      "cve": "CVE-2022-49370",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49370"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfirmware: dmi-sysfs: Fix memory leak in dmi_sysfs_register_handle\n\nkobject_init_and_add() takes reference even when it fails.\nAccording to the doc of kobject_init_and_add()\n\n   If this function returns an error, kobject_put() must be called to\n   properly clean up the memory associated with the object.\n\nFix this issue by calling kobject_put().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49370",
          "url": "https://www.suse.com/security/cve/CVE-2022-49370"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238467 for CVE-2022-49370",
          "url": "https://bugzilla.suse.com/1238467"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49370"
    },
    {
      "cve": "CVE-2022-49372",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49372"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: tcp_rtx_synack() can be called from process context\n\nLaurent reported the enclosed report [1]\n\nThis bug triggers with following coditions:\n\n0) Kernel built with CONFIG_DEBUG_PREEMPT=y\n\n1) A new passive FastOpen TCP socket is created.\n   This FO socket waits for an ACK coming from client to be a complete\n   ESTABLISHED one.\n2) A socket operation on this socket goes through lock_sock()\n   release_sock() dance.\n3) While the socket is owned by the user in step 2),\n   a retransmit of the SYN is received and stored in socket backlog.\n4) At release_sock() time, the socket backlog is processed while\n   in process context.\n5) A SYNACK packet is cooked in response of the SYN retransmit.\n6) -\u003e tcp_rtx_synack() is called in process context.\n\nBefore blamed commit, tcp_rtx_synack() was always called from BH handler,\nfrom a timer handler.\n\nFix this by using TCP_INC_STATS() \u0026 NET_INC_STATS()\nwhich do not assume caller is in non preemptible context.\n\n[1]\nBUG: using __this_cpu_add() in preemptible [00000000] code: epollpep/2180\ncaller is tcp_rtx_synack.part.0+0x36/0xc0\nCPU: 10 PID: 2180 Comm: epollpep Tainted: G           OE     5.16.0-0.bpo.4-amd64 #1  Debian 5.16.12-1~bpo11+1\nHardware name: Supermicro SYS-5039MC-H8TRF/X11SCD-F, BIOS 1.7 11/23/2021\nCall Trace:\n \u003cTASK\u003e\n dump_stack_lvl+0x48/0x5e\n check_preemption_disabled+0xde/0xe0\n tcp_rtx_synack.part.0+0x36/0xc0\n tcp_rtx_synack+0x8d/0xa0\n ? kmem_cache_alloc+0x2e0/0x3e0\n ? apparmor_file_alloc_security+0x3b/0x1f0\n inet_rtx_syn_ack+0x16/0x30\n tcp_check_req+0x367/0x610\n tcp_rcv_state_process+0x91/0xf60\n ? get_nohz_timer_target+0x18/0x1a0\n ? lock_timer_base+0x61/0x80\n ? preempt_count_add+0x68/0xa0\n tcp_v4_do_rcv+0xbd/0x270\n __release_sock+0x6d/0xb0\n release_sock+0x2b/0x90\n sock_setsockopt+0x138/0x1140\n ? __sys_getsockname+0x7e/0xc0\n ? aa_sk_perm+0x3e/0x1a0\n __sys_setsockopt+0x198/0x1e0\n __x64_sys_setsockopt+0x21/0x30\n do_syscall_64+0x38/0xc0\n entry_SYSCALL_64_after_hwframe+0x44/0xae",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49372",
          "url": "https://www.suse.com/security/cve/CVE-2022-49372"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238251 for CVE-2022-49372",
          "url": "https://bugzilla.suse.com/1238251"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49372"
    },
    {
      "cve": "CVE-2022-49388",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49388"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nubi: ubi_create_volume: Fix use-after-free when volume creation failed\n\nThere is an use-after-free problem for \u0027eba_tbl\u0027 in ubi_create_volume()\u0027s\nerror handling path:\n\n  ubi_eba_replace_table(vol, eba_tbl)\n    vol-\u003eeba_tbl = tbl\nout_mapping:\n  ubi_eba_destroy_table(eba_tbl)   // Free \u0027eba_tbl\u0027\nout_unlock:\n  put_device(\u0026vol-\u003edev)\n    vol_release\n      kfree(tbl-\u003eentries)\t  // UAF\n\nFix it by removing redundant \u0027eba_tbl\u0027 releasing.\nFetch a reproducer in [Link].",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49388",
          "url": "https://www.suse.com/security/cve/CVE-2022-49388"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237934 for CVE-2022-49388",
          "url": "https://bugzilla.suse.com/1237934"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49388"
    },
    {
      "cve": "CVE-2022-49389",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49389"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: usbip: fix a refcount leak in stub_probe()\n\nusb_get_dev() is called in stub_device_alloc(). When stub_probe() fails\nafter that, usb_put_dev() needs to be called to release the reference.\n\nFix this by moving usb_put_dev() to sdev_free error path handling.\n\nFind this by code review.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49389",
          "url": "https://www.suse.com/security/cve/CVE-2022-49389"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238257 for CVE-2022-49389",
          "url": "https://bugzilla.suse.com/1238257"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49389"
    },
    {
      "cve": "CVE-2022-49395",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49395"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\num: Fix out-of-bounds read in LDT setup\n\nsyscall_stub_data() expects the data_count parameter to be the number of\nlongs, not bytes.\n\n ==================================================================\n BUG: KASAN: stack-out-of-bounds in syscall_stub_data+0x70/0xe0\n Read of size 128 at addr 000000006411f6f0 by task swapper/1\n\n CPU: 0 PID: 1 Comm: swapper Not tainted 5.18.0+ #18\n Call Trace:\n  show_stack.cold+0x166/0x2a7\n  __dump_stack+0x3a/0x43\n  dump_stack_lvl+0x1f/0x27\n  print_report.cold+0xdb/0xf81\n  kasan_report+0x119/0x1f0\n  kasan_check_range+0x3a3/0x440\n  memcpy+0x52/0x140\n  syscall_stub_data+0x70/0xe0\n  write_ldt_entry+0xac/0x190\n  init_new_ldt+0x515/0x960\n  init_new_context+0x2c4/0x4d0\n  mm_init.constprop.0+0x5ed/0x760\n  mm_alloc+0x118/0x170\n  0x60033f48\n  do_one_initcall+0x1d7/0x860\n  0x60003e7b\n  kernel_init+0x6e/0x3d4\n  new_thread_handler+0x1e7/0x2c0\n\n The buggy address belongs to stack of task swapper/1\n  and is located at offset 64 in frame:\n  init_new_ldt+0x0/0x960\n\n This frame has 2 objects:\n  [32, 40) \u0027addr\u0027\n  [64, 80) \u0027desc\u0027\n ==================================================================",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49395",
          "url": "https://www.suse.com/security/cve/CVE-2022-49395"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237953 for CVE-2022-49395",
          "url": "https://bugzilla.suse.com/1237953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49395"
    },
    {
      "cve": "CVE-2022-49397",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49397"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nphy: qcom-qmp: fix struct clk leak on probe errors\n\nMake sure to release the pipe clock reference in case of a late probe\nerror (e.g. probe deferral).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49397",
          "url": "https://www.suse.com/security/cve/CVE-2022-49397"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237823 for CVE-2022-49397",
          "url": "https://bugzilla.suse.com/1237823"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49397"
    },
    {
      "cve": "CVE-2022-49404",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49404"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: Fix potential integer multiplication overflow errors\n\nWhen multiplying of different types, an overflow is possible even when\nstoring the result in a larger type. This is because the conversion is\ndone after the multiplication. So arithmetic overflow and thus in\nincorrect value is possible.\n\nCorrect an instance of this in the inter packet delay calculation.  Fix by\nensuring one of the operands is u64 which will promote the other to u64 as\nwell ensuring no overflow.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49404",
          "url": "https://www.suse.com/security/cve/CVE-2022-49404"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238430 for CVE-2022-49404",
          "url": "https://bugzilla.suse.com/1238430"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49404"
    },
    {
      "cve": "CVE-2022-49407",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49407"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndlm: fix plock invalid read\n\nThis patch fixes an invalid read showed by KASAN. A unlock will allocate a\n\"struct plock_op\" and a followed send_op() will append it to a global\nsend_list data structure. In some cases a followed dev_read() moves it\nto recv_list and dev_write() will cast it to \"struct plock_xop\" and access\nfields which are only available in those structures. At this point an\ninvalid read happens by accessing those fields.\n\nTo fix this issue the \"callback\" field is moved to \"struct plock_op\" to\nindicate that a cast to \"plock_xop\" is allowed and does the additional\n\"plock_xop\" handling if set.\n\nExample of the KASAN output which showed the invalid read:\n\n[ 2064.296453] ==================================================================\n[ 2064.304852] BUG: KASAN: slab-out-of-bounds in dev_write+0x52b/0x5a0 [dlm]\n[ 2064.306491] Read of size 8 at addr ffff88800ef227d8 by task dlm_controld/7484\n[ 2064.308168]\n[ 2064.308575] CPU: 0 PID: 7484 Comm: dlm_controld Kdump: loaded Not tainted 5.14.0+ #9\n[ 2064.310292] Hardware name: Red Hat KVM, BIOS 0.5.1 01/01/2011\n[ 2064.311618] Call Trace:\n[ 2064.312218]  dump_stack_lvl+0x56/0x7b\n[ 2064.313150]  print_address_description.constprop.8+0x21/0x150\n[ 2064.314578]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.315610]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.316595]  kasan_report.cold.14+0x7f/0x11b\n[ 2064.317674]  ? dev_write+0x52b/0x5a0 [dlm]\n[ 2064.318687]  dev_write+0x52b/0x5a0 [dlm]\n[ 2064.319629]  ? dev_read+0x4a0/0x4a0 [dlm]\n[ 2064.320713]  ? bpf_lsm_kernfs_init_security+0x10/0x10\n[ 2064.321926]  vfs_write+0x17e/0x930\n[ 2064.322769]  ? __fget_light+0x1aa/0x220\n[ 2064.323753]  ksys_write+0xf1/0x1c0\n[ 2064.324548]  ? __ia32_sys_read+0xb0/0xb0\n[ 2064.325464]  do_syscall_64+0x3a/0x80\n[ 2064.326387]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 2064.327606] RIP: 0033:0x7f807e4ba96f\n[ 2064.328470] Code: 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 39 87 f8 ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 b8 01 00 00 00 0f 05 \u003c48\u003e 3d 00 f0 ff ff 77 31 44 89 c7 48 89 44 24 08 e8 7c 87 f8 ff 48\n[ 2064.332902] RSP: 002b:00007ffd50cfe6e0 EFLAGS: 00000293 ORIG_RAX: 0000000000000001\n[ 2064.334658] RAX: ffffffffffffffda RBX: 000055cc3886eb30 RCX: 00007f807e4ba96f\n[ 2064.336275] RDX: 0000000000000040 RSI: 00007ffd50cfe7e0 RDI: 0000000000000010\n[ 2064.337980] RBP: 00007ffd50cfe7e0 R08: 0000000000000000 R09: 0000000000000001\n[ 2064.339560] R10: 000055cc3886eb30 R11: 0000000000000293 R12: 000055cc3886eb80\n[ 2064.341237] R13: 000055cc3886eb00 R14: 000055cc3886f590 R15: 0000000000000001\n[ 2064.342857]\n[ 2064.343226] Allocated by task 12438:\n[ 2064.344057]  kasan_save_stack+0x1c/0x40\n[ 2064.345079]  __kasan_kmalloc+0x84/0xa0\n[ 2064.345933]  kmem_cache_alloc_trace+0x13b/0x220\n[ 2064.346953]  dlm_posix_unlock+0xec/0x720 [dlm]\n[ 2064.348811]  do_lock_file_wait.part.32+0xca/0x1d0\n[ 2064.351070]  fcntl_setlk+0x281/0xbc0\n[ 2064.352879]  do_fcntl+0x5e4/0xfe0\n[ 2064.354657]  __x64_sys_fcntl+0x11f/0x170\n[ 2064.356550]  do_syscall_64+0x3a/0x80\n[ 2064.358259]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[ 2064.360745]\n[ 2064.361511] Last potentially related work creation:\n[ 2064.363957]  kasan_save_stack+0x1c/0x40\n[ 2064.365811]  __kasan_record_aux_stack+0xaf/0xc0\n[ 2064.368100]  call_rcu+0x11b/0xf70\n[ 2064.369785]  dlm_process_incoming_buffer+0x47d/0xfd0 [dlm]\n[ 2064.372404]  receive_from_sock+0x290/0x770 [dlm]\n[ 2064.374607]  process_recv_sockets+0x32/0x40 [dlm]\n[ 2064.377290]  process_one_work+0x9a8/0x16e0\n[ 2064.379357]  worker_thread+0x87/0xbf0\n[ 2064.381188]  kthread+0x3ac/0x490\n[ 2064.383460]  ret_from_fork+0x22/0x30\n[ 2064.385588]\n[ 2064.386518] Second to last potentially related work creation:\n[ 2064.389219]  kasan_save_stack+0x1c/0x40\n[ 2064.391043]  __kasan_record_aux_stack+0xaf/0xc0\n[ 2064.393303]  call_rcu+0x11b/0xf70\n[ 2064.394885]  dlm_process_incoming_buffer+0x47d/0xfd0 [dlm]\n[ 2064.397694]  receive_from_sock+0x290/0x770 \n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49407",
          "url": "https://www.suse.com/security/cve/CVE-2022-49407"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238180 for CVE-2022-49407",
          "url": "https://bugzilla.suse.com/1238180"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49407"
    },
    {
      "cve": "CVE-2022-49409",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49409"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug_on in __es_tree_search\n\nHulk Robot reported a BUG_ON:\n==================================================================\nkernel BUG at fs/ext4/extents_status.c:199!\n[...]\nRIP: 0010:ext4_es_end fs/ext4/extents_status.c:199 [inline]\nRIP: 0010:__es_tree_search+0x1e0/0x260 fs/ext4/extents_status.c:217\n[...]\nCall Trace:\n ext4_es_cache_extent+0x109/0x340 fs/ext4/extents_status.c:766\n ext4_cache_extents+0x239/0x2e0 fs/ext4/extents.c:561\n ext4_find_extent+0x6b7/0xa20 fs/ext4/extents.c:964\n ext4_ext_map_blocks+0x16b/0x4b70 fs/ext4/extents.c:4384\n ext4_map_blocks+0xe26/0x19f0 fs/ext4/inode.c:567\n ext4_getblk+0x320/0x4c0 fs/ext4/inode.c:980\n ext4_bread+0x2d/0x170 fs/ext4/inode.c:1031\n ext4_quota_read+0x248/0x320 fs/ext4/super.c:6257\n v2_read_header+0x78/0x110 fs/quota/quota_v2.c:63\n v2_check_quota_file+0x76/0x230 fs/quota/quota_v2.c:82\n vfs_load_quota_inode+0x5d1/0x1530 fs/quota/dquot.c:2368\n dquot_enable+0x28a/0x330 fs/quota/dquot.c:2490\n ext4_quota_enable fs/ext4/super.c:6137 [inline]\n ext4_enable_quotas+0x5d7/0x960 fs/ext4/super.c:6163\n ext4_fill_super+0xa7c9/0xdc00 fs/ext4/super.c:4754\n mount_bdev+0x2e9/0x3b0 fs/super.c:1158\n mount_fs+0x4b/0x1e4 fs/super.c:1261\n[...]\n==================================================================\n\nAbove issue may happen as follows:\n-------------------------------------\next4_fill_super\n ext4_enable_quotas\n  ext4_quota_enable\n   ext4_iget\n    __ext4_iget\n     ext4_ext_check_inode\n      ext4_ext_check\n       __ext4_ext_check\n        ext4_valid_extent_entries\n         Check for overlapping extents does\u0027t take effect\n   dquot_enable\n    vfs_load_quota_inode\n     v2_check_quota_file\n      v2_read_header\n       ext4_quota_read\n        ext4_bread\n         ext4_getblk\n          ext4_map_blocks\n           ext4_ext_map_blocks\n            ext4_find_extent\n             ext4_cache_extents\n              ext4_es_cache_extent\n               ext4_es_cache_extent\n                __es_tree_search\n                 ext4_es_end\n                  BUG_ON(es-\u003ees_lblk + es-\u003ees_len \u003c es-\u003ees_lblk)\n\nThe error ext4 extents is as follows:\n0af3 0300 0400 0000 00000000    extent_header\n00000000 0100 0000 12000000     extent1\n00000000 0100 0000 18000000     extent2\n02000000 0400 0000 14000000     extent3\n\nIn the ext4_valid_extent_entries function,\nif prev is 0, no error is returned even if lblock\u003c=prev.\nThis was intended to skip the check on the first extent, but\nin the error image above, prev=0+1-1=0 when checking the second extent,\nso even though lblock\u003c=prev, the function does not return an error.\nAs a result, bug_ON occurs in __es_tree_search and the system panics.\n\nTo solve this problem, we only need to check that:\n1. The lblock of the first extent is not less than 0.\n2. The lblock of the next extent  is not less than\n   the next block of the previous extent.\nThe same applies to extent_idx.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49409",
          "url": "https://www.suse.com/security/cve/CVE-2022-49409"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238279 for CVE-2022-49409",
          "url": "https://bugzilla.suse.com/1238279"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49409"
    },
    {
      "cve": "CVE-2022-49413",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49413"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbfq: Update cgroup information before merging bio\n\nWhen the process is migrated to a different cgroup (or in case of\nwriteback just starts submitting bios associated with a different\ncgroup) bfq_merge_bio() can operate with stale cgroup information in\nbic. Thus the bio can be merged to a request from a different cgroup or\nit can result in merging of bfqqs for different cgroups or bfqqs of\nalready dead cgroups and causing possible use-after-free issues. Fix the\nproblem by updating cgroup information in bfq_merge_bio().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49413",
          "url": "https://www.suse.com/security/cve/CVE-2022-49413"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238710 for CVE-2022-49413",
          "url": "https://bugzilla.suse.com/1238710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238711 for CVE-2022-49413",
          "url": "https://bugzilla.suse.com/1238711"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49413"
    },
    {
      "cve": "CVE-2022-49414",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49414"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix race condition between ext4_write and ext4_convert_inline_data\n\nHulk Robot reported a BUG_ON:\n ==================================================================\n EXT4-fs error (device loop3): ext4_mb_generate_buddy:805: group 0,\n block bitmap and bg descriptor inconsistent: 25 vs 31513 free clusters\n kernel BUG at fs/ext4/ext4_jbd2.c:53!\n invalid opcode: 0000 [#1] SMP KASAN PTI\n CPU: 0 PID: 25371 Comm: syz-executor.3 Not tainted 5.10.0+ #1\n RIP: 0010:ext4_put_nojournal fs/ext4/ext4_jbd2.c:53 [inline]\n RIP: 0010:__ext4_journal_stop+0x10e/0x110 fs/ext4/ext4_jbd2.c:116\n [...]\n Call Trace:\n  ext4_write_inline_data_end+0x59a/0x730 fs/ext4/inline.c:795\n  generic_perform_write+0x279/0x3c0 mm/filemap.c:3344\n  ext4_buffered_write_iter+0x2e3/0x3d0 fs/ext4/file.c:270\n  ext4_file_write_iter+0x30a/0x11c0 fs/ext4/file.c:520\n  do_iter_readv_writev+0x339/0x3c0 fs/read_write.c:732\n  do_iter_write+0x107/0x430 fs/read_write.c:861\n  vfs_writev fs/read_write.c:934 [inline]\n  do_pwritev+0x1e5/0x380 fs/read_write.c:1031\n [...]\n ==================================================================\n\nAbove issue may happen as follows:\n           cpu1                     cpu2\n__________________________|__________________________\ndo_pwritev\n vfs_writev\n  do_iter_write\n   ext4_file_write_iter\n    ext4_buffered_write_iter\n     generic_perform_write\n      ext4_da_write_begin\n                           vfs_fallocate\n                            ext4_fallocate\n                             ext4_convert_inline_data\n                              ext4_convert_inline_data_nolock\n                               ext4_destroy_inline_data_nolock\n                                clear EXT4_STATE_MAY_INLINE_DATA\n                               ext4_map_blocks\n                                ext4_ext_map_blocks\n                                 ext4_mb_new_blocks\n                                  ext4_mb_regular_allocator\n                                   ext4_mb_good_group_nolock\n                                    ext4_mb_init_group\n                                     ext4_mb_init_cache\n                                      ext4_mb_generate_buddy  --\u003e error\n       ext4_test_inode_state(inode, EXT4_STATE_MAY_INLINE_DATA)\n                                ext4_restore_inline_data\n                                 set EXT4_STATE_MAY_INLINE_DATA\n       ext4_block_write_begin\n      ext4_da_write_end\n       ext4_test_inode_state(inode, EXT4_STATE_MAY_INLINE_DATA)\n       ext4_write_inline_data_end\n        handle=NULL\n        ext4_journal_stop(handle)\n         __ext4_journal_stop\n          ext4_put_nojournal(handle)\n           ref_cnt = (unsigned long)handle\n           BUG_ON(ref_cnt == 0)  ---\u003e BUG_ON\n\nThe lock held by ext4_convert_inline_data is xattr_sem, but the lock\nheld by generic_perform_write is i_rwsem. Therefore, the two locks can\nbe concurrent.\n\nTo solve above issue, we add inode_lock() for ext4_convert_inline_data().\nAt the same time, move ext4_convert_inline_data() in front of\next4_punch_hole(), remove similar handling from ext4_punch_hole().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49414",
          "url": "https://www.suse.com/security/cve/CVE-2022-49414"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238623 for CVE-2022-49414",
          "url": "https://bugzilla.suse.com/1238623"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49414"
    },
    {
      "cve": "CVE-2022-49416",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49416"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: mac80211: fix use-after-free in chanctx code\n\nIn ieee80211_vif_use_reserved_context(), when we have an\nold context and the new context\u0027s replace_state is set to\nIEEE80211_CHANCTX_REPLACE_NONE, we free the old context\nin ieee80211_vif_use_reserved_reassign(). Therefore, we\ncannot check the old_ctx anymore, so we should set it to\nNULL after this point.\n\nHowever, since the new_ctx replace state is clearly not\nIEEE80211_CHANCTX_REPLACES_OTHER, we\u0027re not going to do\nanything else in this function and can just return to\navoid accessing the freed old_ctx.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49416",
          "url": "https://www.suse.com/security/cve/CVE-2022-49416"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238293 for CVE-2022-49416",
          "url": "https://bugzilla.suse.com/1238293"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49416"
    },
    {
      "cve": "CVE-2022-49421",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49421"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvideo: fbdev: clcdfb: Fix refcount leak in clcdfb_of_vram_setup\n\nof_parse_phandle() returns a node pointer with refcount incremented, we should\nuse of_node_put() on it when not need anymore.  Add missing of_node_put() to\navoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49421",
          "url": "https://www.suse.com/security/cve/CVE-2022-49421"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238819 for CVE-2022-49421",
          "url": "https://bugzilla.suse.com/1238819"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49421"
    },
    {
      "cve": "CVE-2022-49429",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49429"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: Prevent panic when SDMA is disabled\n\nIf the hfi1 module is loaded with HFI1_CAP_SDMA off, a call to\nhfi1_write_iter() will dereference a NULL pointer and panic. A typical\nstack frame is:\n\n  sdma_select_user_engine [hfi1]\n  hfi1_user_sdma_process_request [hfi1]\n  hfi1_write_iter [hfi1]\n  do_iter_readv_writev\n  do_iter_write\n  vfs_writev\n  do_writev\n  do_syscall_64\n\nThe fix is to test for SDMA in hfi1_write_iter() and fail the I/O with\nEINVAL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49429",
          "url": "https://www.suse.com/security/cve/CVE-2022-49429"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238889 for CVE-2022-49429",
          "url": "https://bugzilla.suse.com/1238889"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49429"
    },
    {
      "cve": "CVE-2022-49432",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49432"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xics: fix refcount leak in icp_opal_init()\n\nThe of_find_compatible_node() function returns a node pointer with\nrefcount incremented, use of_node_put() on it when done.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49432",
          "url": "https://www.suse.com/security/cve/CVE-2022-49432"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238950 for CVE-2022-49432",
          "url": "https://bugzilla.suse.com/1238950"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49432"
    },
    {
      "cve": "CVE-2022-49433",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49433"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nRDMA/hfi1: Prevent use of lock before it is initialized\n\nIf there is a failure during probe of hfi1 before the sdma_map_lock is\ninitialized, the call to hfi1_free_devdata() will attempt to use a lock\nthat has not been initialized. If the locking correctness validator is on\nthen an INFO message and stack trace resembling the following may be seen:\n\n  INFO: trying to register non-static key.\n  The code is fine but needs lockdep annotation, or maybe\n  you didn\u0027t initialize this object before use?\n  turning off the locking correctness validator.\n  Call Trace:\n  register_lock_class+0x11b/0x880\n  __lock_acquire+0xf3/0x7930\n  lock_acquire+0xff/0x2d0\n  _raw_spin_lock_irq+0x46/0x60\n  sdma_clean+0x42a/0x660 [hfi1]\n  hfi1_free_devdata+0x3a7/0x420 [hfi1]\n  init_one+0x867/0x11a0 [hfi1]\n  pci_device_probe+0x40e/0x8d0\n\nThe use of sdma_map_lock in sdma_clean() is for freeing the sdma_map\nmemory, and sdma_map is not allocated/initialized until after\nsdma_map_lock has been initialized. This code only needs to be run if\nsdma_map is not NULL, and so checking for that condition will avoid trying\nto use the lock before it is initialized.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49433",
          "url": "https://www.suse.com/security/cve/CVE-2022-49433"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238268 for CVE-2022-49433",
          "url": "https://bugzilla.suse.com/1238268"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49433"
    },
    {
      "cve": "CVE-2022-49434",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49434"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Avoid pci_dev_lock() AB/BA deadlock with sriov_numvfs_store()\n\nThe sysfs sriov_numvfs_store() path acquires the device lock before the\nconfig space access lock:\n\n  sriov_numvfs_store\n    device_lock                 # A (1) acquire device lock\n    sriov_configure\n      vfio_pci_sriov_configure  # (for example)\n        vfio_pci_core_sriov_configure\n          pci_disable_sriov\n            sriov_disable\n              pci_cfg_access_lock\n                pci_wait_cfg    # B (4) wait for dev-\u003eblock_cfg_access == 0\n\nPreviously, pci_dev_lock() acquired the config space access lock before the\ndevice lock:\n\n  pci_dev_lock\n    pci_cfg_access_lock\n      dev-\u003eblock_cfg_access = 1 # B (2) set dev-\u003eblock_cfg_access = 1\n    device_lock                 # A (3) wait for device lock\n\nAny path that uses pci_dev_lock(), e.g., pci_reset_function(), may\ndeadlock with sriov_numvfs_store() if the operations occur in the sequence\n(1) (2) (3) (4).\n\nAvoid the deadlock by reversing the order in pci_dev_lock() so it acquires\nthe device lock before the config space access lock, the same as the\nsriov_numvfs_store() path.\n\n[bhelgaas: combined and adapted commit log from Jay Zhou\u0027s independent\nsubsequent posting:\nhttps://lore.kernel.org/r/20220404062539.1710-1-jianjay.zhou@huawei.com]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49434",
          "url": "https://www.suse.com/security/cve/CVE-2022-49434"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238916 for CVE-2022-49434",
          "url": "https://bugzilla.suse.com/1238916"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49434"
    },
    {
      "cve": "CVE-2022-49437",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49437"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xive: Fix refcount leak in xive_spapr_init\n\nof_find_compatible_node() returns a node pointer with refcount\nincremented, we should use of_node_put() on it when done.\nAdd missing of_node_put() to avoid refcount leak.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49437",
          "url": "https://www.suse.com/security/cve/CVE-2022-49437"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238443 for CVE-2022-49437",
          "url": "https://bugzilla.suse.com/1238443"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49437"
    },
    {
      "cve": "CVE-2022-49443",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49443"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nlist: fix a data-race around ep-\u003erdllist\n\nep_poll() first calls ep_events_available() with no lock held and checks\nif ep-\u003erdllist is empty by list_empty_careful(), which reads\nrdllist-\u003eprev.  Thus all accesses to it need some protection to avoid\nstore/load-tearing.\n\nNote INIT_LIST_HEAD_RCU() already has the annotation for both prev\nand next.\n\nCommit bf3b9f6372c4 (\"epoll: Add busy poll support to epoll with socket\nfds.\") added the first lockless ep_events_available(), and commit\nc5a282e9635e (\"fs/epoll: reduce the scope of wq lock in epoll_wait()\")\nmade some ep_events_available() calls lockless and added single call under\na lock, finally commit e59d3c64cba6 (\"epoll: eliminate unnecessary lock\nfor zero timeout\") made the last ep_events_available() lockless.\n\nBUG: KCSAN: data-race in do_epoll_wait / do_epoll_wait\n\nwrite to 0xffff88810480c7d8 of 8 bytes by task 1802 on cpu 0:\n INIT_LIST_HEAD include/linux/list.h:38 [inline]\n list_splice_init include/linux/list.h:492 [inline]\n ep_start_scan fs/eventpoll.c:622 [inline]\n ep_send_events fs/eventpoll.c:1656 [inline]\n ep_poll fs/eventpoll.c:1806 [inline]\n do_epoll_wait+0x4eb/0xf40 fs/eventpoll.c:2234\n do_epoll_pwait fs/eventpoll.c:2268 [inline]\n __do_sys_epoll_pwait fs/eventpoll.c:2281 [inline]\n __se_sys_epoll_pwait+0x12b/0x240 fs/eventpoll.c:2275\n __x64_sys_epoll_pwait+0x74/0x80 fs/eventpoll.c:2275\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nread to 0xffff88810480c7d8 of 8 bytes by task 1799 on cpu 1:\n list_empty_careful include/linux/list.h:329 [inline]\n ep_events_available fs/eventpoll.c:381 [inline]\n ep_poll fs/eventpoll.c:1797 [inline]\n do_epoll_wait+0x279/0xf40 fs/eventpoll.c:2234\n do_epoll_pwait fs/eventpoll.c:2268 [inline]\n __do_sys_epoll_pwait fs/eventpoll.c:2281 [inline]\n __se_sys_epoll_pwait+0x12b/0x240 fs/eventpoll.c:2275\n __x64_sys_epoll_pwait+0x74/0x80 fs/eventpoll.c:2275\n do_syscall_x64 arch/x86/entry/common.c:50 [inline]\n do_syscall_64+0x44/0xd0 arch/x86/entry/common.c:80\n entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nvalue changed: 0xffff88810480c7d0 -\u003e 0xffff888103c15098\n\nReported by Kernel Concurrency Sanitizer on:\nCPU: 1 PID: 1799 Comm: syz-fuzzer Tainted: G        W         5.17.0-rc7-syzkaller-dirty #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49443",
          "url": "https://www.suse.com/security/cve/CVE-2022-49443"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238434 for CVE-2022-49443",
          "url": "https://bugzilla.suse.com/1238434"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49443"
    },
    {
      "cve": "CVE-2022-49444",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49444"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmodule: fix [e_shstrndx].sh_size=0 OOB access\n\nIt is trivial to craft a module to trigger OOB access in this line:\n\n\tif (info-\u003esecstrings[strhdr-\u003esh_size - 1] != \u0027\\0\u0027) {\n\nBUG: unable to handle page fault for address: ffffc90000aa0fff\nPGD 100000067 P4D 100000067 PUD 100066067 PMD 10436f067 PTE 0\nOops: 0000 [#1] PREEMPT SMP PTI\nCPU: 7 PID: 1215 Comm: insmod Not tainted 5.18.0-rc5-00007-g9bf578647087-dirty #10\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.14.0-4.fc34 04/01/2014\nRIP: 0010:load_module+0x19b/0x2391\n\n[rebased patch onto modules-next]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49444",
          "url": "https://www.suse.com/security/cve/CVE-2022-49444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238127 for CVE-2022-49444",
          "url": "https://bugzilla.suse.com/1238127"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49444"
    },
    {
      "cve": "CVE-2022-49472",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49472"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: phy: micrel: Allow probing without .driver_data\n\nCurrently, if the .probe element is present in the phy_driver structure\nand the .driver_data is not, a NULL pointer dereference happens.\n\nAllow passing .probe without .driver_data by inserting NULL checks\nfor priv-\u003etype.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49472",
          "url": "https://www.suse.com/security/cve/CVE-2022-49472"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238951 for CVE-2022-49472",
          "url": "https://bugzilla.suse.com/1238951"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49472"
    },
    {
      "cve": "CVE-2022-49488",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49488"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/mdp5: Return error code in mdp5_mixer_release when deadlock is detected\n\nThere is a possibility for mdp5_get_global_state to return\n-EDEADLK when acquiring the modeset lock, but currently global_state in\nmdp5_mixer_release doesn\u0027t check for if an error is returned.\n\nTo avoid a NULL dereference error, let\u0027s have mdp5_mixer_release\ncheck if an error is returned and propagate that error.\n\nPatchwork: https://patchwork.freedesktop.org/patch/485181/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49488",
          "url": "https://www.suse.com/security/cve/CVE-2022-49488"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238600 for CVE-2022-49488",
          "url": "https://bugzilla.suse.com/1238600"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49488"
    },
    {
      "cve": "CVE-2022-49492",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49492"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme-pci: fix a NULL pointer dereference in nvme_alloc_admin_tags\n\nIn nvme_alloc_admin_tags, the admin_q can be set to an error (typically\n-ENOMEM) if the blk_mq_init_queue call fails to set up the queue, which\nis checked immediately after the call. However, when we return the error\nmessage up the stack, to nvme_reset_work the error takes us to\nnvme_remove_dead_ctrl()\n  nvme_dev_disable()\n   nvme_suspend_queue(\u0026dev-\u003equeues[0]).\n\nHere, we only check that the admin_q is non-NULL, rather than not\nan error or NULL, and begin quiescing a queue that never existed, leading\nto bad / NULL pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49492",
          "url": "https://www.suse.com/security/cve/CVE-2022-49492"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238954 for CVE-2022-49492",
          "url": "https://bugzilla.suse.com/1238954"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49492"
    },
    {
      "cve": "CVE-2022-49495",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49495"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/msm/hdmi: check return value after calling platform_get_resource_byname()\n\nIt will cause null-ptr-deref if platform_get_resource_byname() returns NULL,\nwe need check the return value.\n\nPatchwork: https://patchwork.freedesktop.org/patch/482992/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49495",
          "url": "https://www.suse.com/security/cve/CVE-2022-49495"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237932 for CVE-2022-49495",
          "url": "https://bugzilla.suse.com/1237932"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49495"
    },
    {
      "cve": "CVE-2022-49497",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49497"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: remove two BUG() from skb_checksum_help()\n\nI have a syzbot report that managed to get a crash in skb_checksum_help()\n\nIf syzbot can trigger these BUG(), it makes sense to replace\nthem with more friendly WARN_ON_ONCE() since skb_checksum_help()\ncan instead return an error code.\n\nNote that syzbot will still crash there, until real bug is fixed.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49497",
          "url": "https://www.suse.com/security/cve/CVE-2022-49497"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238946 for CVE-2022-49497",
          "url": "https://bugzilla.suse.com/1238946"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49497"
    },
    {
      "cve": "CVE-2022-49505",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49505"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nNFC: NULL out the dev-\u003erfkill to prevent UAF\n\nCommit 3e3b5dfcd16a (\"NFC: reorder the logic in nfc_{un,}register_device\")\nassumes the device_is_registered() in function nfc_dev_up() will help\nto check when the rfkill is unregistered. However, this check only\ntake effect when device_del(\u0026dev-\u003edev) is done in nfc_unregister_device().\nHence, the rfkill object is still possible be dereferenced.\n\nThe crash trace in latest kernel (5.18-rc2):\n\n[   68.760105] ==================================================================\n[   68.760330] BUG: KASAN: use-after-free in __lock_acquire+0x3ec1/0x6750\n[   68.760756] Read of size 8 at addr ffff888009c93018 by task fuzz/313\n[   68.760756]\n[   68.760756] CPU: 0 PID: 313 Comm: fuzz Not tainted 5.18.0-rc2 #4\n[   68.760756] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014\n[   68.760756] Call Trace:\n[   68.760756]  \u003cTASK\u003e\n[   68.760756]  dump_stack_lvl+0x57/0x7d\n[   68.760756]  print_report.cold+0x5e/0x5db\n[   68.760756]  ? __lock_acquire+0x3ec1/0x6750\n[   68.760756]  kasan_report+0xbe/0x1c0\n[   68.760756]  ? __lock_acquire+0x3ec1/0x6750\n[   68.760756]  __lock_acquire+0x3ec1/0x6750\n[   68.760756]  ? lockdep_hardirqs_on_prepare+0x410/0x410\n[   68.760756]  ? register_lock_class+0x18d0/0x18d0\n[   68.760756]  lock_acquire+0x1ac/0x4f0\n[   68.760756]  ? rfkill_blocked+0xe/0x60\n[   68.760756]  ? lockdep_hardirqs_on_prepare+0x410/0x410\n[   68.760756]  ? mutex_lock_io_nested+0x12c0/0x12c0\n[   68.760756]  ? nla_get_range_signed+0x540/0x540\n[   68.760756]  ? _raw_spin_lock_irqsave+0x4e/0x50\n[   68.760756]  _raw_spin_lock_irqsave+0x39/0x50\n[   68.760756]  ? rfkill_blocked+0xe/0x60\n[   68.760756]  rfkill_blocked+0xe/0x60\n[   68.760756]  nfc_dev_up+0x84/0x260\n[   68.760756]  nfc_genl_dev_up+0x90/0xe0\n[   68.760756]  genl_family_rcv_msg_doit+0x1f4/0x2f0\n[   68.760756]  ? genl_family_rcv_msg_attrs_parse.constprop.0+0x230/0x230\n[   68.760756]  ? security_capable+0x51/0x90\n[   68.760756]  genl_rcv_msg+0x280/0x500\n[   68.760756]  ? genl_get_cmd+0x3c0/0x3c0\n[   68.760756]  ? lock_acquire+0x1ac/0x4f0\n[   68.760756]  ? nfc_genl_dev_down+0xe0/0xe0\n[   68.760756]  ? lockdep_hardirqs_on_prepare+0x410/0x410\n[   68.760756]  netlink_rcv_skb+0x11b/0x340\n[   68.760756]  ? genl_get_cmd+0x3c0/0x3c0\n[   68.760756]  ? netlink_ack+0x9c0/0x9c0\n[   68.760756]  ? netlink_deliver_tap+0x136/0xb00\n[   68.760756]  genl_rcv+0x1f/0x30\n[   68.760756]  netlink_unicast+0x430/0x710\n[   68.760756]  ? memset+0x20/0x40\n[   68.760756]  ? netlink_attachskb+0x740/0x740\n[   68.760756]  ? __build_skb_around+0x1f4/0x2a0\n[   68.760756]  netlink_sendmsg+0x75d/0xc00\n[   68.760756]  ? netlink_unicast+0x710/0x710\n[   68.760756]  ? netlink_unicast+0x710/0x710\n[   68.760756]  sock_sendmsg+0xdf/0x110\n[   68.760756]  __sys_sendto+0x19e/0x270\n[   68.760756]  ? __ia32_sys_getpeername+0xa0/0xa0\n[   68.760756]  ? fd_install+0x178/0x4c0\n[   68.760756]  ? fd_install+0x195/0x4c0\n[   68.760756]  ? kernel_fpu_begin_mask+0x1c0/0x1c0\n[   68.760756]  __x64_sys_sendto+0xd8/0x1b0\n[   68.760756]  ? lockdep_hardirqs_on+0xbf/0x130\n[   68.760756]  ? syscall_enter_from_user_mode+0x1d/0x50\n[   68.760756]  do_syscall_64+0x3b/0x90\n[   68.760756]  entry_SYSCALL_64_after_hwframe+0x44/0xae\n[   68.760756] RIP: 0033:0x7f67fb50e6b3\n...\n[   68.760756] RSP: 002b:00007f67fa91fe90 EFLAGS: 00000293 ORIG_RAX: 000000000000002c\n[   68.760756] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f67fb50e6b3\n[   68.760756] RDX: 000000000000001c RSI: 0000559354603090 RDI: 0000000000000003\n[   68.760756] RBP: 00007f67fa91ff00 R08: 00007f67fa91fedc R09: 000000000000000c\n[   68.760756] R10: 0000000000000000 R11: 0000000000000293 R12: 00007ffe824d496e\n[   68.760756] R13: 00007ffe824d496f R14: 00007f67fa120000 R15: 0000000000000003\n\n[   68.760756]  \u003c/TASK\u003e\n[   68.760756]\n[   68.760756] Allocated by task 279:\n[   68.760756]  kasan_save_stack+0x1e/0x40\n[\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49505",
          "url": "https://www.suse.com/security/cve/CVE-2022-49505"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238615 for CVE-2022-49505",
          "url": "https://bugzilla.suse.com/1238615"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49505"
    },
    {
      "cve": "CVE-2022-49513",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49513"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncpufreq: governor: Use kobject release() method to free dbs_data\n\nThe struct dbs_data embeds a struct gov_attr_set and\nthe struct gov_attr_set embeds a kobject. Since every kobject must have\na release() method and we can\u0027t use kfree() to free it directly,\nso introduce cpufreq_dbs_data_release() to release the dbs_data via\nthe kobject::release() method. This fixes the calltrace like below:\n\n  ODEBUG: free active (active state 0) object type: timer_list hint: delayed_work_timer_fn+0x0/0x34\n  WARNING: CPU: 12 PID: 810 at lib/debugobjects.c:505 debug_print_object+0xb8/0x100\n  Modules linked in:\n  CPU: 12 PID: 810 Comm: sh Not tainted 5.16.0-next-20220120-yocto-standard+ #536\n  Hardware name: Marvell OcteonTX CN96XX board (DT)\n  pstate: 60400009 (nZCv daif +PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n  pc : debug_print_object+0xb8/0x100\n  lr : debug_print_object+0xb8/0x100\n  sp : ffff80001dfcf9a0\n  x29: ffff80001dfcf9a0 x28: 0000000000000001 x27: ffff0001464f0000\n  x26: 0000000000000000 x25: ffff8000090e3f00 x24: ffff80000af60210\n  x23: ffff8000094dfb78 x22: ffff8000090e3f00 x21: ffff0001080b7118\n  x20: ffff80000aeb2430 x19: ffff800009e8f5e0 x18: 0000000000000000\n  x17: 0000000000000002 x16: 00004d62e58be040 x15: 013590470523aff8\n  x14: ffff8000090e1828 x13: 0000000001359047 x12: 00000000f5257d14\n  x11: 0000000000040591 x10: 0000000066c1ffea x9 : ffff8000080d15e0\n  x8 : ffff80000a1765a8 x7 : 0000000000000000 x6 : 0000000000000001\n  x5 : ffff800009e8c000 x4 : ffff800009e8c760 x3 : 0000000000000000\n  x2 : 0000000000000000 x1 : 0000000000000000 x0 : ffff0001474ed040\n  Call trace:\n   debug_print_object+0xb8/0x100\n   __debug_check_no_obj_freed+0x1d0/0x25c\n   debug_check_no_obj_freed+0x24/0xa0\n   kfree+0x11c/0x440\n   cpufreq_dbs_governor_exit+0xa8/0xac\n   cpufreq_exit_governor+0x44/0x90\n   cpufreq_set_policy+0x29c/0x570\n   store_scaling_governor+0x110/0x154\n   store+0xb0/0xe0\n   sysfs_kf_write+0x58/0x84\n   kernfs_fop_write_iter+0x12c/0x1c0\n   new_sync_write+0xf0/0x18c\n   vfs_write+0x1cc/0x220\n   ksys_write+0x74/0x100\n   __arm64_sys_write+0x28/0x3c\n   invoke_syscall.constprop.0+0x58/0xf0\n   do_el0_svc+0x70/0x170\n   el0_svc+0x54/0x190\n   el0t_64_sync_handler+0xa4/0x130\n   el0t_64_sync+0x1a0/0x1a4\n  irq event stamp: 189006\n  hardirqs last  enabled at (189005): [\u003cffff8000080849d0\u003e] finish_task_switch.isra.0+0xe0/0x2c0\n  hardirqs last disabled at (189006): [\u003cffff8000090667a4\u003e] el1_dbg+0x24/0xa0\n  softirqs last  enabled at (188966): [\u003cffff8000080106d0\u003e] __do_softirq+0x4b0/0x6a0\n  softirqs last disabled at (188957): [\u003cffff80000804a618\u003e] __irq_exit_rcu+0x108/0x1a4\n\n[ rjw: Because can be freed by the gov_attr_set_put() in\n  cpufreq_dbs_governor_exit() now, it is also necessary to put the\n  invocation of the governor -\u003eexit() callback into the new\n  cpufreq_dbs_data_release() function. ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49513",
          "url": "https://www.suse.com/security/cve/CVE-2022-49513"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237800 for CVE-2022-49513",
          "url": "https://bugzilla.suse.com/1237800"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49513"
    },
    {
      "cve": "CVE-2022-49516",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49516"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nice: always check VF VSI pointer values\n\nThe ice_get_vf_vsi function can return NULL in some cases, such as if\nhandling messages during a reset where the VSI is being removed and\nrecreated.\n\nSeveral places throughout the driver do not bother to check whether this\nVSI pointer is valid. Static analysis tools maybe report issues because\nthey detect paths where a potentially NULL pointer could be dereferenced.\n\nFix this by checking the return value of ice_get_vf_vsi everywhere.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49516",
          "url": "https://www.suse.com/security/cve/CVE-2022-49516"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238953 for CVE-2022-49516",
          "url": "https://bugzilla.suse.com/1238953"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49516"
    },
    {
      "cve": "CVE-2022-49519",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49519"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nath10k: skip ath10k_halt during suspend for driver state RESTARTING\n\nDouble free crash is observed when FW recovery(caused by wmi\ntimeout/crash) is followed by immediate suspend event. The FW recovery\nis triggered by ath10k_core_restart() which calls driver clean up via\nath10k_halt(). When the suspend event occurs between the FW recovery,\nthe restart worker thread is put into frozen state until suspend completes.\nThe suspend event triggers ath10k_stop() which again triggers ath10k_halt()\nThe double invocation of ath10k_halt() causes ath10k_htt_rx_free() to be\ncalled twice(Note: ath10k_htt_rx_alloc was not called by restart worker\nthread because of its frozen state), causing the crash.\n\nTo fix this, during the suspend flow, skip call to ath10k_halt() in\nath10k_stop() when the current driver state is ATH10K_STATE_RESTARTING.\nAlso, for driver state ATH10K_STATE_RESTARTING, call\nath10k_wait_for_suspend() in ath10k_stop(). This is because call to\nath10k_wait_for_suspend() is skipped later in\n[ath10k_halt() \u003e ath10k_core_stop()] for the driver state\nATH10K_STATE_RESTARTING.\n\nThe frozen restart worker thread will be cancelled during resume when the\ndevice comes out of suspend.\n\nBelow is the crash stack for reference:\n\n[  428.469167] ------------[ cut here ]------------\n[  428.469180] kernel BUG at mm/slub.c:4150!\n[  428.469193] invalid opcode: 0000 [#1] PREEMPT SMP NOPTI\n[  428.469219] Workqueue: events_unbound async_run_entry_fn\n[  428.469230] RIP: 0010:kfree+0x319/0x31b\n[  428.469241] RSP: 0018:ffffa1fac015fc30 EFLAGS: 00010246\n[  428.469247] RAX: ffffedb10419d108 RBX: ffff8c05262b0000\n[  428.469252] RDX: ffff8c04a8c07000 RSI: 0000000000000000\n[  428.469256] RBP: ffffa1fac015fc78 R08: 0000000000000000\n[  428.469276] CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n[  428.469285] Call Trace:\n[  428.469295]  ? dma_free_attrs+0x5f/0x7d\n[  428.469320]  ath10k_core_stop+0x5b/0x6f\n[  428.469336]  ath10k_halt+0x126/0x177\n[  428.469352]  ath10k_stop+0x41/0x7e\n[  428.469387]  drv_stop+0x88/0x10e\n[  428.469410]  __ieee80211_suspend+0x297/0x411\n[  428.469441]  rdev_suspend+0x6e/0xd0\n[  428.469462]  wiphy_suspend+0xb1/0x105\n[  428.469483]  ? name_show+0x2d/0x2d\n[  428.469490]  dpm_run_callback+0x8c/0x126\n[  428.469511]  ? name_show+0x2d/0x2d\n[  428.469517]  __device_suspend+0x2e7/0x41b\n[  428.469523]  async_suspend+0x1f/0x93\n[  428.469529]  async_run_entry_fn+0x3d/0xd1\n[  428.469535]  process_one_work+0x1b1/0x329\n[  428.469541]  worker_thread+0x213/0x372\n[  428.469547]  kthread+0x150/0x15f\n[  428.469552]  ? pr_cont_work+0x58/0x58\n[  428.469558]  ? kthread_blkcg+0x31/0x31\n\nTested-on: QCA6174 hw3.2 PCI WLAN.RM.4.4.1-00288-QCARMSWPZ-1",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49519",
          "url": "https://www.suse.com/security/cve/CVE-2022-49519"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238943 for CVE-2022-49519",
          "url": "https://bugzilla.suse.com/1238943"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49519"
    },
    {
      "cve": "CVE-2022-49524",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49524"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: pci: cx23885: Fix the error handling in cx23885_initdev()\n\nWhen the driver fails to call the dma_set_mask(), the driver will get\nthe following splat:\n\n[   55.853884] BUG: KASAN: use-after-free in __process_removed_driver+0x3c/0x240\n[   55.854486] Read of size 8 at addr ffff88810de60408 by task modprobe/590\n[   55.856822] Call Trace:\n[   55.860327]  __process_removed_driver+0x3c/0x240\n[   55.861347]  bus_for_each_dev+0x102/0x160\n[   55.861681]  i2c_del_driver+0x2f/0x50\n\nThis is because the driver has initialized the i2c related resources\nin cx23885_dev_setup() but not released them in error handling, fix this\nbug by modifying the error path that jumps after failing to call the\ndma_set_mask().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49524",
          "url": "https://www.suse.com/security/cve/CVE-2022-49524"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238949 for CVE-2022-49524",
          "url": "https://bugzilla.suse.com/1238949"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49524"
    },
    {
      "cve": "CVE-2022-49526",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49526"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmd/bitmap: don\u0027t set sb values if can\u0027t pass sanity check\n\nIf bitmap area contains invalid data, kernel will crash then mdadm\ntriggers \"Segmentation fault\".\nThis is cluster-md speical bug. In non-clustered env, mdadm will\nhandle broken metadata case. In clustered array, only kernel space\nhandles bitmap slot info. But even this bug only happened in clustered\nenv, current sanity check is wrong, the code should be changed.\n\nHow to trigger: (faulty injection)\n\ndd if=/dev/zero bs=1M count=1 oflag=direct of=/dev/sda\ndd if=/dev/zero bs=1M count=1 oflag=direct of=/dev/sdb\nmdadm -C /dev/md0 -b clustered -e 1.2 -n 2 -l mirror /dev/sda /dev/sdb\nmdadm -Ss\necho aaa \u003e magic.txt\n == below modifying slot 2 bitmap data ==\ndd if=magic.txt of=/dev/sda seek=16384 bs=1 count=3 \u003c== destroy magic\ndd if=/dev/zero of=/dev/sda seek=16436 bs=1 count=4 \u003c== ZERO chunksize\nmdadm -A /dev/md0 /dev/sda /dev/sdb\n == kernel crashes. mdadm outputs \"Segmentation fault\" ==\n\nReason of kernel crash:\n\nIn md_bitmap_read_sb (called by md_bitmap_create), bad bitmap magic didn\u0027t\nblock chunksize assignment, and zero value made DIV_ROUND_UP_SECTOR_T()\ntrigger \"divide error\".\n\nCrash log:\n\nkernel: md: md0 stopped.\nkernel: md/raid1:md0: not clean -- starting background reconstruction\nkernel: md/raid1:md0: active with 2 out of 2 mirrors\nkernel: dlm: ... ...\nkernel: md-cluster: Joined cluster 44810aba-38bb-e6b8-daca-bc97a0b254aa slot 1\nkernel: md0: invalid bitmap file superblock: bad magic\nkernel: md_bitmap_copy_from_slot can\u0027t get bitmap from slot 2\nkernel: md-cluster: Could not gather bitmaps from slot 2\nkernel: divide error: 0000 [#1] SMP NOPTI\nkernel: CPU: 0 PID: 1603 Comm: mdadm Not tainted 5.14.6-1-default\nkernel: Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)\nkernel: RIP: 0010:md_bitmap_create+0x1d1/0x850 [md_mod]\nkernel: RSP: 0018:ffffc22ac0843ba0 EFLAGS: 00010246\nkernel: ... ...\nkernel: Call Trace:\nkernel:  ? dlm_lock_sync+0xd0/0xd0 [md_cluster 77fe..7a0]\nkernel:  md_bitmap_copy_from_slot+0x2c/0x290 [md_mod 24ea..d3a]\nkernel:  load_bitmaps+0xec/0x210 [md_cluster 77fe..7a0]\nkernel:  md_bitmap_load+0x81/0x1e0 [md_mod 24ea..d3a]\nkernel:  do_md_run+0x30/0x100 [md_mod 24ea..d3a]\nkernel:  md_ioctl+0x1290/0x15a0 [md_mod 24ea....d3a]\nkernel:  ? mddev_unlock+0xaa/0x130 [md_mod 24ea..d3a]\nkernel:  ? blkdev_ioctl+0xb1/0x2b0\nkernel:  block_ioctl+0x3b/0x40\nkernel:  __x64_sys_ioctl+0x7f/0xb0\nkernel:  do_syscall_64+0x59/0x80\nkernel:  ? exit_to_user_mode_prepare+0x1ab/0x230\nkernel:  ? syscall_exit_to_user_mode+0x18/0x40\nkernel:  ? do_syscall_64+0x69/0x80\nkernel:  entry_SYSCALL_64_after_hwframe+0x44/0xae\nkernel: RIP: 0033:0x7f4a15fa722b\nkernel: ... ...\nkernel: ---[ end trace 8afa7612f559c868 ]---\nkernel: RIP: 0010:md_bitmap_create+0x1d1/0x850 [md_mod]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49526",
          "url": "https://www.suse.com/security/cve/CVE-2022-49526"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238030 for CVE-2022-49526",
          "url": "https://bugzilla.suse.com/1238030"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49526"
    },
    {
      "cve": "CVE-2022-49530",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49530"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amd/pm: fix double free in si_parse_power_table()\n\nIn function si_parse_power_table(), array adev-\u003epm.dpm.ps and its member\nis allocated. If the allocation of each member fails, the array itself\nis freed and returned with an error code. However, the array is later\nfreed again in si_dpm_fini() function which is called when the function\nreturns an error.\n\nThis leads to potential double free of the array adev-\u003epm.dpm.ps, as\nwell as leak of its array members, since the members are not freed in\nthe allocation function and the array is not nulled when freed.\nIn addition adev-\u003epm.dpm.num_ps, which keeps track of the allocated\narray member, is not updated until the member allocation is\nsuccessfully finished, this could also lead to either use after free,\nor uninitialized variable access in si_dpm_fini().\n\nFix this by postponing the free of the array until si_dpm_fini() and\nincrement adev-\u003epm.dpm.num_ps everytime the array member is allocated.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49530",
          "url": "https://www.suse.com/security/cve/CVE-2022-49530"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238944 for CVE-2022-49530",
          "url": "https://bugzilla.suse.com/1238944"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49530"
    },
    {
      "cve": "CVE-2022-49532",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49532"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/virtio: fix NULL pointer dereference in virtio_gpu_conn_get_modes\n\ndrm_cvt_mode may return NULL and we should check it.\n\nThis bug is found by syzkaller:\n\nFAULT_INJECTION stacktrace:\n[  168.567394] FAULT_INJECTION: forcing a failure.\nname failslab, interval 1, probability 0, space 0, times 1\n[  168.567403] CPU: 1 PID: 6425 Comm: syz Kdump: loaded Not tainted 4.19.90-vhulk2201.1.0.h1035.kasan.eulerosv2r10.aarch64 #1\n[  168.567406] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015\n[  168.567408] Call trace:\n[  168.567414]  dump_backtrace+0x0/0x310\n[  168.567418]  show_stack+0x28/0x38\n[  168.567423]  dump_stack+0xec/0x15c\n[  168.567427]  should_fail+0x3ac/0x3d0\n[  168.567437]  __should_failslab+0xb8/0x120\n[  168.567441]  should_failslab+0x28/0xc0\n[  168.567445]  kmem_cache_alloc_trace+0x50/0x640\n[  168.567454]  drm_mode_create+0x40/0x90\n[  168.567458]  drm_cvt_mode+0x48/0xc78\n[  168.567477]  virtio_gpu_conn_get_modes+0xa8/0x140 [virtio_gpu]\n[  168.567485]  drm_helper_probe_single_connector_modes+0x3a4/0xd80\n[  168.567492]  drm_mode_getconnector+0x2e0/0xa70\n[  168.567496]  drm_ioctl_kernel+0x11c/0x1d8\n[  168.567514]  drm_ioctl+0x558/0x6d0\n[  168.567522]  do_vfs_ioctl+0x160/0xf30\n[  168.567525]  ksys_ioctl+0x98/0xd8\n[  168.567530]  __arm64_sys_ioctl+0x50/0xc8\n[  168.567536]  el0_svc_common+0xc8/0x320\n[  168.567540]  el0_svc_handler+0xf8/0x160\n[  168.567544]  el0_svc+0x10/0x218\n\nKASAN stacktrace:\n[  168.567561] BUG: KASAN: null-ptr-deref in virtio_gpu_conn_get_modes+0xb4/0x140 [virtio_gpu]\n[  168.567565] Read of size 4 at addr 0000000000000054 by task syz/6425\n[  168.567566]\n[  168.567571] CPU: 1 PID: 6425 Comm: syz Kdump: loaded Not tainted 4.19.90-vhulk2201.1.0.h1035.kasan.eulerosv2r10.aarch64 #1\n[  168.567573] Hardware name: QEMU KVM Virtual Machine, BIOS 0.0.0 02/06/2015\n[  168.567575] Call trace:\n[  168.567578]  dump_backtrace+0x0/0x310\n[  168.567582]  show_stack+0x28/0x38\n[  168.567586]  dump_stack+0xec/0x15c\n[  168.567591]  kasan_report+0x244/0x2f0\n[  168.567594]  __asan_load4+0x58/0xb0\n[  168.567607]  virtio_gpu_conn_get_modes+0xb4/0x140 [virtio_gpu]\n[  168.567612]  drm_helper_probe_single_connector_modes+0x3a4/0xd80\n[  168.567617]  drm_mode_getconnector+0x2e0/0xa70\n[  168.567621]  drm_ioctl_kernel+0x11c/0x1d8\n[  168.567624]  drm_ioctl+0x558/0x6d0\n[  168.567628]  do_vfs_ioctl+0x160/0xf30\n[  168.567632]  ksys_ioctl+0x98/0xd8\n[  168.567636]  __arm64_sys_ioctl+0x50/0xc8\n[  168.567641]  el0_svc_common+0xc8/0x320\n[  168.567645]  el0_svc_handler+0xf8/0x160\n[  168.567649]  el0_svc+0x10/0x218",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49532",
          "url": "https://www.suse.com/security/cve/CVE-2022-49532"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238925 for CVE-2022-49532",
          "url": "https://bugzilla.suse.com/1238925"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49532"
    },
    {
      "cve": "CVE-2022-49538",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49538"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: jack: Access input_dev under mutex\n\nIt is possible when using ASoC that input_dev is unregistered while\ncalling snd_jack_report, which causes NULL pointer dereference.\nIn order to prevent this serialize access to input_dev using mutex lock.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49538",
          "url": "https://www.suse.com/security/cve/CVE-2022-49538"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238843 for CVE-2022-49538",
          "url": "https://bugzilla.suse.com/1238843"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49538"
    },
    {
      "cve": "CVE-2022-49544",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49544"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipw2x00: Fix potential NULL dereference in libipw_xmit()\n\ncrypt and crypt-\u003eops could be null, so we need to checking null\nbefore dereference",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49544",
          "url": "https://www.suse.com/security/cve/CVE-2022-49544"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238721 for CVE-2022-49544",
          "url": "https://bugzilla.suse.com/1238721"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49544"
    },
    {
      "cve": "CVE-2022-49545",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49545"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: usb-audio: Cancel pending work at closing a MIDI substream\n\nAt closing a USB MIDI output substream, there might be still a pending\nwork, which would eventually access the rawmidi runtime object that is\nbeing released.  For fixing the race, make sure to cancel the pending\nwork at closing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49545",
          "url": "https://www.suse.com/security/cve/CVE-2022-49545"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238729 for CVE-2022-49545",
          "url": "https://bugzilla.suse.com/1238729"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238730 for CVE-2022-49545",
          "url": "https://bugzilla.suse.com/1238730"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49545"
    },
    {
      "cve": "CVE-2022-49546",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49546"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/kexec: fix memory leak of elf header buffer\n\nThis is reported by kmemleak detector:\n\nunreferenced object 0xffffc900002a9000 (size 4096):\n  comm \"kexec\", pid 14950, jiffies 4295110793 (age 373.951s)\n  hex dump (first 32 bytes):\n    7f 45 4c 46 02 01 01 00 00 00 00 00 00 00 00 00  .ELF............\n    04 00 3e 00 01 00 00 00 00 00 00 00 00 00 00 00  ..\u003e.............\n  backtrace:\n    [\u003c0000000016a8ef9f\u003e] __vmalloc_node_range+0x101/0x170\n    [\u003c000000002b66b6c0\u003e] __vmalloc_node+0xb4/0x160\n    [\u003c00000000ad40107d\u003e] crash_prepare_elf64_headers+0x8e/0xcd0\n    [\u003c0000000019afff23\u003e] crash_load_segments+0x260/0x470\n    [\u003c0000000019ebe95c\u003e] bzImage64_load+0x814/0xad0\n    [\u003c0000000093e16b05\u003e] arch_kexec_kernel_image_load+0x1be/0x2a0\n    [\u003c000000009ef2fc88\u003e] kimage_file_alloc_init+0x2ec/0x5a0\n    [\u003c0000000038f5a97a\u003e] __do_sys_kexec_file_load+0x28d/0x530\n    [\u003c0000000087c19992\u003e] do_syscall_64+0x3b/0x90\n    [\u003c0000000066e063a4\u003e] entry_SYSCALL_64_after_hwframe+0x44/0xae\n\nIn crash_prepare_elf64_headers(), a buffer is allocated via vmalloc() to\nstore elf headers.  While it\u0027s not freed back to system correctly when\nkdump kernel is reloaded or unloaded.  Then memory leak is caused.  Fix it\nby introducing x86 specific function arch_kimage_file_post_load_cleanup(),\nand freeing the buffer there.\n\nAnd also remove the incorrect elf header buffer freeing code.  Before\ncalling arch specific kexec_file loading function, the image instance has\nbeen initialized.  So \u0027image-\u003eelf_headers\u0027 must be NULL.  It doesn\u0027t make\nsense to free the elf header buffer in the place.\n\nThree different people have reported three bugs about the memory leak on\nx86_64 inside Redhat.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49546",
          "url": "https://www.suse.com/security/cve/CVE-2022-49546"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238750 for CVE-2022-49546",
          "url": "https://bugzilla.suse.com/1238750"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 2.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49546"
    },
    {
      "cve": "CVE-2022-49555",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49555"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: hci_qca: Use del_timer_sync() before freeing\n\nWhile looking at a crash report on a timer list being corrupted, which\nusually happens when a timer is freed while still active. This is\ncommonly triggered by code calling del_timer() instead of\ndel_timer_sync() just before freeing.\n\nOne possible culprit is the hci_qca driver, which does exactly that.\n\nEric mentioned that wake_retrans_timer could be rearmed via the work\nqueue, so also move the destruction of the work queue before\ndel_timer_sync().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49555",
          "url": "https://www.suse.com/security/cve/CVE-2022-49555"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238231 for CVE-2022-49555",
          "url": "https://bugzilla.suse.com/1238231"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49555"
    },
    {
      "cve": "CVE-2022-49563",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49563"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - add param check for RSA\n\nReject requests with a source buffer that is bigger than the size of the\nkey. This is to prevent a possible integer underflow that might happen\nwhen copying the source scatterlist into a linear buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49563",
          "url": "https://www.suse.com/security/cve/CVE-2022-49563"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238787 for CVE-2022-49563",
          "url": "https://bugzilla.suse.com/1238787"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238788 for CVE-2022-49563",
          "url": "https://bugzilla.suse.com/1238788"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49563"
    },
    {
      "cve": "CVE-2022-49564",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49564"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - add param check for DH\n\nReject requests with a source buffer that is bigger than the size of the\nkey. This is to prevent a possible integer underflow that might happen\nwhen copying the source scatterlist into a linear buffer.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49564",
          "url": "https://www.suse.com/security/cve/CVE-2022-49564"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238789 for CVE-2022-49564",
          "url": "https://bugzilla.suse.com/1238789"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238790 for CVE-2022-49564",
          "url": "https://bugzilla.suse.com/1238790"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2022-49564"
    },
    {
      "cve": "CVE-2022-49566",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49566"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncrypto: qat - fix memory leak in RSA\n\nWhen an RSA key represented in form 2 (as defined in PKCS #1 V2.1) is\nused, some components of the private key persist even after the TFM is\nreleased.\nReplace the explicit calls to free the buffers in qat_rsa_exit_tfm()\nwith a call to qat_rsa_clear_ctx() which frees all buffers referenced in\nthe TFM context.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49566",
          "url": "https://www.suse.com/security/cve/CVE-2022-49566"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238266 for CVE-2022-49566",
          "url": "https://bugzilla.suse.com/1238266"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49566"
    },
    {
      "cve": "CVE-2022-49578",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49578"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nip: Fix data-races around sysctl_ip_prot_sock.\n\nsysctl_ip_prot_sock is accessed concurrently, and there is always a chance\nof data-race.  So, all readers and writers need some basic protection to\navoid load/store-tearing.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49578",
          "url": "https://www.suse.com/security/cve/CVE-2022-49578"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238794 for CVE-2022-49578",
          "url": "https://bugzilla.suse.com/1238794"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49578"
    },
    {
      "cve": "CVE-2022-49581",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49581"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbe2net: Fix buffer overflow in be_get_module_eeprom\n\nbe_cmd_read_port_transceiver_data assumes that it is given a buffer that\nis at least PAGE_DATA_LEN long, or twice that if the module supports SFF\n8472. However, this is not always the case.\n\nFix this by passing the desired offset and length to\nbe_cmd_read_port_transceiver_data so that we only copy the bytes once.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49581",
          "url": "https://www.suse.com/security/cve/CVE-2022-49581"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238540 for CVE-2022-49581",
          "url": "https://bugzilla.suse.com/1238540"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49581"
    },
    {
      "cve": "CVE-2022-49584",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49584"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nixgbe: Add locking to prevent panic when setting sriov_numvfs to zero\n\nIt is possible to disable VFs while the PF driver is processing requests\nfrom the VF driver.  This can result in a panic.\n\nBUG: unable to handle kernel paging request at 000000000000106c\nPGD 0 P4D 0\nOops: 0000 [#1] SMP NOPTI\nCPU: 8 PID: 0 Comm: swapper/8 Kdump: loaded Tainted: G I      --------- -\nHardware name: Dell Inc. PowerEdge R740/06WXJT, BIOS 2.8.2 08/27/2020\nRIP: 0010:ixgbe_msg_task+0x4c8/0x1690 [ixgbe]\nCode: 00 00 48 8d 04 40 48 c1 e0 05 89 7c 24 24 89 fd 48 89 44 24 10 83 ff\n01 0f 84 b8 04 00 00 4c 8b 64 24 10 4d 03 a5 48 22 00 00 \u003c41\u003e 80 7c 24 4c\n00 0f 84 8a 03 00 00 0f b7 c7 83 f8 08 0f 84 8f 0a\nRSP: 0018:ffffb337869f8df8 EFLAGS: 00010002\nRAX: 0000000000001020 RBX: 0000000000000000 RCX: 000000000000002b\nRDX: 0000000000000002 RSI: 0000000000000008 RDI: 0000000000000006\nRBP: 0000000000000006 R08: 0000000000000002 R09: 0000000000029780\nR10: 00006957d8f42832 R11: 0000000000000000 R12: 0000000000001020\nR13: ffff8a00e8978ac0 R14: 000000000000002b R15: ffff8a00e8979c80\nFS:  0000000000000000(0000) GS:ffff8a07dfd00000(0000) knlGS:00000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 000000000000106c CR3: 0000000063e10004 CR4: 00000000007726e0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n \u003cIRQ\u003e\n ? ttwu_do_wakeup+0x19/0x140\n ? try_to_wake_up+0x1cd/0x550\n ? ixgbevf_update_xcast_mode+0x71/0xc0 [ixgbevf]\n ixgbe_msix_other+0x17e/0x310 [ixgbe]\n __handle_irq_event_percpu+0x40/0x180\n handle_irq_event_percpu+0x30/0x80\n handle_irq_event+0x36/0x53\n handle_edge_irq+0x82/0x190\n handle_irq+0x1c/0x30\n do_IRQ+0x49/0xd0\n common_interrupt+0xf/0xf\n\nThis can be eventually be reproduced with the following script:\n\nwhile :\ndo\n    echo 63 \u003e /sys/class/net/\u003cdevname\u003e/device/sriov_numvfs\n    sleep 1\n    echo 0 \u003e /sys/class/net/\u003cdevname\u003e/device/sriov_numvfs\n    sleep 1\ndone\n\nAdd lock when disabling SR-IOV to prevent process VF mailbox communication.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49584",
          "url": "https://www.suse.com/security/cve/CVE-2022-49584"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237933 for CVE-2022-49584",
          "url": "https://bugzilla.suse.com/1237933"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49584"
    },
    {
      "cve": "CVE-2022-49589",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49589"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigmp: Fix data-races around sysctl_igmp_qrv.\n\nWhile reading sysctl_igmp_qrv, it can be changed concurrently.\nThus, we need to add READ_ONCE() to its readers.\n\nThis test can be packed into a helper, so such changes will be in the\nfollow-up series after net is merged into net-next.\n\n  qrv ?: READ_ONCE(net-\u003eipv4.sysctl_igmp_qrv);",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49589",
          "url": "https://www.suse.com/security/cve/CVE-2022-49589"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238598 for CVE-2022-49589",
          "url": "https://bugzilla.suse.com/1238598"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49589"
    },
    {
      "cve": "CVE-2022-49605",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49605"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nigc: Reinstate IGC_REMOVED logic and implement it properly\n\nThe initially merged version of the igc driver code (via commit\n146740f9abc4, \"igc: Add support for PF\") contained the following\nIGC_REMOVED checks in the igc_rd32/wr32() MMIO accessors:\n\n\tu32 igc_rd32(struct igc_hw *hw, u32 reg)\n\t{\n\t\tu8 __iomem *hw_addr = READ_ONCE(hw-\u003ehw_addr);\n\t\tu32 value = 0;\n\n\t\tif (IGC_REMOVED(hw_addr))\n\t\t\treturn ~value;\n\n\t\tvalue = readl(\u0026hw_addr[reg]);\n\n\t\t/* reads should not return all F\u0027s */\n\t\tif (!(~value) \u0026\u0026 (!reg || !(~readl(hw_addr))))\n\t\t\thw-\u003ehw_addr = NULL;\n\n\t\treturn value;\n\t}\n\nAnd:\n\n\t#define wr32(reg, val) \\\n\tdo { \\\n\t\tu8 __iomem *hw_addr = READ_ONCE((hw)-\u003ehw_addr); \\\n\t\tif (!IGC_REMOVED(hw_addr)) \\\n\t\t\twritel((val), \u0026hw_addr[(reg)]); \\\n\t} while (0)\n\nE.g. igb has similar checks in its MMIO accessors, and has a similar\nmacro E1000_REMOVED, which is implemented as follows:\n\n\t#define E1000_REMOVED(h) unlikely(!(h))\n\nThese checks serve to detect and take note of an 0xffffffff MMIO read\nreturn from the device, which can be caused by a PCIe link flap or some\nother kind of PCI bus error, and to avoid performing MMIO reads and\nwrites from that point onwards.\n\nHowever, the IGC_REMOVED macro was not originally implemented:\n\n\t#ifndef IGC_REMOVED\n\t#define IGC_REMOVED(a) (0)\n\t#endif /* IGC_REMOVED */\n\nThis led to the IGC_REMOVED logic to be removed entirely in a\nsubsequent commit (commit 3c215fb18e70, \"igc: remove IGC_REMOVED\nfunction\"), with the rationale that such checks matter only for\nvirtualization and that igc does not support virtualization -- but a\nPCIe device can become detached even without virtualization being in\nuse, and without proper checks, a PCIe bus error affecting an igc\nadapter will lead to various NULL pointer dereferences, as the first\naccess after the error will set hw-\u003ehw_addr to NULL, and subsequent\naccesses will blindly dereference this now-NULL pointer.\n\nThis patch reinstates the IGC_REMOVED checks in igc_rd32/wr32(), and\nimplements IGC_REMOVED the way it is done for igb, by checking for the\nunlikely() case of hw_addr being NULL.  This change prevents the oopses\nseen when a PCIe link flap occurs on an igc adapter.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49605",
          "url": "https://www.suse.com/security/cve/CVE-2022-49605"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238433 for CVE-2022-49605",
          "url": "https://bugzilla.suse.com/1238433"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49605"
    },
    {
      "cve": "CVE-2022-49607",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49607"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nperf/core: Fix data race between perf_event_set_output() and perf_mmap_close()\n\nYang Jihing reported a race between perf_event_set_output() and\nperf_mmap_close():\n\n\tCPU1\t\t\t\t\tCPU2\n\n\tperf_mmap_close(e2)\n\t  if (atomic_dec_and_test(\u0026e2-\u003erb-\u003emmap_count)) // 1 - \u003e 0\n\t    detach_rest = true\n\n\t\t\t\t\t\tioctl(e1, IOC_SET_OUTPUT, e2)\n\t\t\t\t\t\t  perf_event_set_output(e1, e2)\n\n\t  ...\n\t  list_for_each_entry_rcu(e, \u0026e2-\u003erb-\u003eevent_list, rb_entry)\n\t    ring_buffer_attach(e, NULL);\n\t    // e1 isn\u0027t yet added and\n\t    // therefore not detached\n\n\t\t\t\t\t\t    ring_buffer_attach(e1, e2-\u003erb)\n\t\t\t\t\t\t      list_add_rcu(\u0026e1-\u003erb_entry,\n\t\t\t\t\t\t\t\t   \u0026e2-\u003erb-\u003eevent_list)\n\nAfter this; e1 is attached to an unmapped rb and a subsequent\nperf_mmap() will loop forever more:\n\n\tagain:\n\t\tmutex_lock(\u0026e-\u003emmap_mutex);\n\t\tif (event-\u003erb) {\n\t\t\t...\n\t\t\tif (!atomic_inc_not_zero(\u0026e-\u003erb-\u003emmap_count)) {\n\t\t\t\t...\n\t\t\t\tmutex_unlock(\u0026e-\u003emmap_mutex);\n\t\t\t\tgoto again;\n\t\t\t}\n\t\t}\n\nThe loop in perf_mmap_close() holds e2-\u003emmap_mutex, while the attach\nin perf_event_set_output() holds e1-\u003emmap_mutex. As such there is no\nserialization to avoid this race.\n\nChange perf_event_set_output() to take both e1-\u003emmap_mutex and\ne2-\u003emmap_mutex to alleviate that problem. Additionally, have the loop\nin perf_mmap() detach the rb directly, this avoids having to wait for\nthe concurrent perf_mmap_close() to get around to doing it to make\nprogress.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49607",
          "url": "https://www.suse.com/security/cve/CVE-2022-49607"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238817 for CVE-2022-49607",
          "url": "https://bugzilla.suse.com/1238817"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49607"
    },
    {
      "cve": "CVE-2022-49610",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49610"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: VMX: Prevent RSB underflow before vmenter\n\nOn VMX, there are some balanced returns between the time the guest\u0027s\nSPEC_CTRL value is written, and the vmenter.\n\nBalanced returns (matched by a preceding call) are usually ok, but it\u0027s\nat least theoretically possible an NMI with a deep call stack could\nempty the RSB before one of the returns.\n\nFor maximum paranoia, don\u0027t allow *any* returns (balanced or otherwise)\nbetween the SPEC_CTRL write and the vmenter.\n\n  [ bp: Fix 32-bit build. ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49610",
          "url": "https://www.suse.com/security/cve/CVE-2022-49610"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238952 for CVE-2022-49610",
          "url": "https://bugzilla.suse.com/1238952"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49610"
    },
    {
      "cve": "CVE-2022-49611",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49611"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nx86/speculation: Fill RSB on vmexit for IBRS\n\nPrevent RSB underflow/poisoning attacks with RSB.  While at it, add a\nbunch of comments to attempt to document the current state of tribal\nknowledge about RSB attacks and what exactly is being mitigated.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49611",
          "url": "https://www.suse.com/security/cve/CVE-2022-49611"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238618 for CVE-2022-49611",
          "url": "https://bugzilla.suse.com/1238618"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49611"
    },
    {
      "cve": "CVE-2022-49619",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49619"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: sfp: fix memory leak in sfp_probe()\n\nsfp_probe() allocates a memory chunk from sfp with sfp_alloc(). When\ndevm_add_action() fails, sfp is not freed, which leads to a memory leak.\n\nWe should use devm_add_action_or_reset() instead of devm_add_action().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49619",
          "url": "https://www.suse.com/security/cve/CVE-2022-49619"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239003 for CVE-2022-49619",
          "url": "https://bugzilla.suse.com/1239003"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49619"
    },
    {
      "cve": "CVE-2022-49620",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49620"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tipc: fix possible refcount leak in tipc_sk_create()\n\nFree sk in case tipc_sk_insert() fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49620",
          "url": "https://www.suse.com/security/cve/CVE-2022-49620"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239002 for CVE-2022-49620",
          "url": "https://bugzilla.suse.com/1239002"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 3.3,
            "baseSeverity": "LOW",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "low"
        }
      ],
      "title": "CVE-2022-49620"
    },
    {
      "cve": "CVE-2022-49623",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49623"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/xive/spapr: correct bitmap allocation size\n\nkasan detects access beyond the end of the xibm-\u003ebitmap allocation:\n\nBUG: KASAN: slab-out-of-bounds in _find_first_zero_bit+0x40/0x140\nRead of size 8 at addr c00000001d1d0118 by task swapper/0/1\n\nCPU: 0 PID: 1 Comm: swapper/0 Not tainted 5.19.0-rc2-00001-g90df023b36dd #28\nCall Trace:\n[c00000001d98f770] [c0000000012baab8] dump_stack_lvl+0xac/0x108 (unreliable)\n[c00000001d98f7b0] [c00000000068faac] print_report+0x37c/0x710\n[c00000001d98f880] [c0000000006902c0] kasan_report+0x110/0x354\n[c00000001d98f950] [c000000000692324] __asan_load8+0xa4/0xe0\n[c00000001d98f970] [c0000000011c6ed0] _find_first_zero_bit+0x40/0x140\n[c00000001d98f9b0] [c0000000000dbfbc] xive_spapr_get_ipi+0xcc/0x260\n[c00000001d98fa70] [c0000000000d6d28] xive_setup_cpu_ipi+0x1e8/0x450\n[c00000001d98fb30] [c000000004032a20] pSeries_smp_probe+0x5c/0x118\n[c00000001d98fb60] [c000000004018b44] smp_prepare_cpus+0x944/0x9ac\n[c00000001d98fc90] [c000000004009f9c] kernel_init_freeable+0x2d4/0x640\n[c00000001d98fd90] [c0000000000131e8] kernel_init+0x28/0x1d0\n[c00000001d98fe10] [c00000000000cd54] ret_from_kernel_thread+0x5c/0x64\n\nAllocated by task 0:\n kasan_save_stack+0x34/0x70\n __kasan_kmalloc+0xb4/0xf0\n __kmalloc+0x268/0x540\n xive_spapr_init+0x4d0/0x77c\n pseries_init_irq+0x40/0x27c\n init_IRQ+0x44/0x84\n start_kernel+0x2a4/0x538\n start_here_common+0x1c/0x20\n\nThe buggy address belongs to the object at c00000001d1d0118\n which belongs to the cache kmalloc-8 of size 8\nThe buggy address is located 0 bytes inside of\n 8-byte region [c00000001d1d0118, c00000001d1d0120)\n\nThe buggy address belongs to the physical page:\npage:c00c000000074740 refcount:1 mapcount:0 mapping:0000000000000000 index:0xc00000001d1d0558 pfn:0x1d1d\nflags: 0x7ffff000000200(slab|node=0|zone=0|lastcpupid=0x7ffff)\nraw: 007ffff000000200 c00000001d0003c8 c00000001d0003c8 c00000001d010480\nraw: c00000001d1d0558 0000000001e1000a 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n c00000001d1d0000: fc 00 fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n c00000001d1d0080: fc fc 00 fc fc fc fc fc fc fc fc fc fc fc fc fc\n\u003ec00000001d1d0100: fc fc fc 02 fc fc fc fc fc fc fc fc fc fc fc fc\n                            ^\n c00000001d1d0180: fc fc fc fc 04 fc fc fc fc fc fc fc fc fc fc fc\n c00000001d1d0200: fc fc fc fc fc 04 fc fc fc fc fc fc fc fc fc fc\n\nThis happens because the allocation uses the wrong unit (bits) when it\nshould pass (BITS_TO_LONGS(count) * sizeof(long)) or equivalent. With small\nnumbers of bits, the allocated object can be smaller than sizeof(long),\nwhich results in invalid accesses.\n\nUse bitmap_zalloc() to allocate and initialize the irq bitmap, paired with\nbitmap_free() for consistency.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49623",
          "url": "https://www.suse.com/security/cve/CVE-2022-49623"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239040 for CVE-2022-49623",
          "url": "https://bugzilla.suse.com/1239040"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49623"
    },
    {
      "cve": "CVE-2022-49638",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49638"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: Fix data-races around sysctl.\n\nWhile reading icmp sysctl variables, they can be changed concurrently.\nSo, we need to add READ_ONCE() to avoid data-races.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49638",
          "url": "https://www.suse.com/security/cve/CVE-2022-49638"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238613 for CVE-2022-49638",
          "url": "https://bugzilla.suse.com/1238613"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49638"
    },
    {
      "cve": "CVE-2022-49640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsysctl: Fix data races in proc_douintvec_minmax().\n\nA sysctl variable is accessed concurrently, and there is always a chance\nof data-race.  So, all readers and writers need some basic protection to\navoid load/store-tearing.\n\nThis patch changes proc_douintvec_minmax() to use READ_ONCE() and\nWRITE_ONCE() internally to fix data-races on the sysctl side.  For now,\nproc_douintvec_minmax() itself is tolerant to a data-race, but we still\nneed to add annotations on the other subsystem\u0027s side.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49640",
          "url": "https://www.suse.com/security/cve/CVE-2022-49640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237782 for CVE-2022-49640",
          "url": "https://bugzilla.suse.com/1237782"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49640"
    },
    {
      "cve": "CVE-2022-49641",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49641"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsysctl: Fix data races in proc_douintvec().\n\nA sysctl variable is accessed concurrently, and there is always a chance\nof data-race.  So, all readers and writers need some basic protection to\navoid load/store-tearing.\n\nThis patch changes proc_douintvec() to use READ_ONCE() and WRITE_ONCE()\ninternally to fix data-races on the sysctl side.  For now, proc_douintvec()\nitself is tolerant to a data-race, but we still need to add annotations on\nthe other subsystem\u0027s side.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49641",
          "url": "https://www.suse.com/security/cve/CVE-2022-49641"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237831 for CVE-2022-49641",
          "url": "https://bugzilla.suse.com/1237831"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49641"
    },
    {
      "cve": "CVE-2022-49647",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49647"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncgroup: Use separate src/dst nodes when preloading css_sets for migration\n\nEach cset (css_set) is pinned by its tasks. When we\u0027re moving tasks around\nacross csets for a migration, we need to hold the source and destination\ncsets to ensure that they don\u0027t go away while we\u0027re moving tasks about. This\nis done by linking cset-\u003emg_preload_node on either the\nmgctx-\u003epreloaded_src_csets or mgctx-\u003epreloaded_dst_csets list. Using the\nsame cset-\u003emg_preload_node for both the src and dst lists was deemed okay as\na cset can\u0027t be both the source and destination at the same time.\n\nUnfortunately, this overloading becomes problematic when multiple tasks are\ninvolved in a migration and some of them are identity noop migrations while\nothers are actually moving across cgroups. For example, this can happen with\nthe following sequence on cgroup1:\n\n #1\u003e mkdir -p /sys/fs/cgroup/misc/a/b\n #2\u003e echo $$ \u003e /sys/fs/cgroup/misc/a/cgroup.procs\n #3\u003e RUN_A_COMMAND_WHICH_CREATES_MULTIPLE_THREADS \u0026\n #4\u003e PID=$!\n #5\u003e echo $PID \u003e /sys/fs/cgroup/misc/a/b/tasks\n #6\u003e echo $PID \u003e /sys/fs/cgroup/misc/a/cgroup.procs\n\nthe process including the group leader back into a. In this final migration,\nnon-leader threads would be doing identity migration while the group leader\nis doing an actual one.\n\nAfter #3, let\u0027s say the whole process was in cset A, and that after #4, the\nleader moves to cset B. Then, during #6, the following happens:\n\n 1. cgroup_migrate_add_src() is called on B for the leader.\n\n 2. cgroup_migrate_add_src() is called on A for the other threads.\n\n 3. cgroup_migrate_prepare_dst() is called. It scans the src list.\n\n 4. It notices that B wants to migrate to A, so it tries to A to the dst\n    list but realizes that its -\u003emg_preload_node is already busy.\n\n 5. and then it notices A wants to migrate to A as it\u0027s an identity\n    migration, it culls it by list_del_init()\u0027ing its -\u003emg_preload_node and\n    putting references accordingly.\n\n 6. The rest of migration takes place with B on the src list but nothing on\n    the dst list.\n\nThis means that A isn\u0027t held while migration is in progress. If all tasks\nleave A before the migration finishes and the incoming task pins it, the\ncset will be destroyed leading to use-after-free.\n\nThis is caused by overloading cset-\u003emg_preload_node for both src and dst\npreload lists. We wanted to exclude the cset from the src list but ended up\ninadvertently excluding it from the dst list too.\n\nThis patch fixes the issue by separating out cset-\u003emg_preload_node into\n-\u003emg_src_preload_node and -\u003emg_dst_preload_node, so that the src and dst\npreloadings don\u0027t interfere with each other.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49647",
          "url": "https://www.suse.com/security/cve/CVE-2022-49647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238805 for CVE-2022-49647",
          "url": "https://bugzilla.suse.com/1238805"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49647"
    },
    {
      "cve": "CVE-2022-49649",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49649"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nxen/netback: avoid entering xenvif_rx_next_skb() with an empty rx queue\n\nxenvif_rx_next_skb() is expecting the rx queue not being empty, but\nin case the loop in xenvif_rx_action() is doing multiple iterations,\nthe availability of another skb in the rx queue is not being checked.\n\nThis can lead to crashes:\n\n[40072.537261] BUG: unable to handle kernel NULL pointer dereference at 0000000000000080\n[40072.537407] IP: xenvif_rx_skb+0x23/0x590 [xen_netback]\n[40072.537534] PGD 0 P4D 0\n[40072.537644] Oops: 0000 [#1] SMP NOPTI\n[40072.537749] CPU: 0 PID: 12505 Comm: v1-c40247-q2-gu Not tainted 4.12.14-122.121-default #1 SLE12-SP5\n[40072.537867] Hardware name: HP ProLiant DL580 Gen9/ProLiant DL580 Gen9, BIOS U17 11/23/2021\n[40072.537999] task: ffff880433b38100 task.stack: ffffc90043d40000\n[40072.538112] RIP: e030:xenvif_rx_skb+0x23/0x590 [xen_netback]\n[40072.538217] RSP: e02b:ffffc90043d43de0 EFLAGS: 00010246\n[40072.538319] RAX: 0000000000000000 RBX: ffffc90043cd7cd0 RCX: 00000000000000f7\n[40072.538430] RDX: 0000000000000000 RSI: 0000000000000006 RDI: ffffc90043d43df8\n[40072.538531] RBP: 000000000000003f R08: 000077ff80000000 R09: 0000000000000008\n[40072.538644] R10: 0000000000007ff0 R11: 00000000000008f6 R12: ffffc90043ce2708\n[40072.538745] R13: 0000000000000000 R14: ffffc90043d43ed0 R15: ffff88043ea748c0\n[40072.538861] FS: 0000000000000000(0000) GS:ffff880484600000(0000) knlGS:0000000000000000\n[40072.538988] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033\n[40072.539088] CR2: 0000000000000080 CR3: 0000000407ac8000 CR4: 0000000000040660\n[40072.539211] Call Trace:\n[40072.539319] xenvif_rx_action+0x71/0x90 [xen_netback]\n[40072.539429] xenvif_kthread_guest_rx+0x14a/0x29c [xen_netback]\n\nFix that by stopping the loop in case the rx queue becomes empty.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49649",
          "url": "https://www.suse.com/security/cve/CVE-2022-49649"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238612 for CVE-2022-49649",
          "url": "https://bugzilla.suse.com/1238612"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49649"
    },
    {
      "cve": "CVE-2022-49657",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49657"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: fix memory leak in error case\n\nusbnet_write_cmd_async() mixed up which buffers\nneed to be freed in which error case.\n\nv2: add Fixes tag\nv3: fix uninitialized buf pointer",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49657",
          "url": "https://www.suse.com/security/cve/CVE-2022-49657"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238269 for CVE-2022-49657",
          "url": "https://bugzilla.suse.com/1238269"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49657"
    },
    {
      "cve": "CVE-2022-49667",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49667"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: bonding: fix use-after-free after 802.3ad slave unbind\n\ncommit 0622cab0341c (\"bonding: fix 802.3ad aggregator reselection\"),\nresolve case, when there is several aggregation groups in the same bond.\nbond_3ad_unbind_slave will invalidate (clear) aggregator when\n__agg_active_ports return zero. So, ad_clear_agg can be executed even, when\nnum_of_ports!=0. Than bond_3ad_unbind_slave can be executed again for,\npreviously cleared aggregator. NOTE: at this time bond_3ad_unbind_slave\nwill not update slave ports list, because lag_ports==NULL. So, here we\ngot slave ports, pointing to freed aggregator memory.\n\nFix with checking actual number of ports in group (as was before\ncommit 0622cab0341c (\"bonding: fix 802.3ad aggregator reselection\") ),\nbefore ad_clear_agg().\n\nThe KASAN logs are as follows:\n\n[  767.617392] ==================================================================\n[  767.630776] BUG: KASAN: use-after-free in bond_3ad_state_machine_handler+0x13dc/0x1470\n[  767.638764] Read of size 2 at addr ffff00011ba9d430 by task kworker/u8:7/767\n[  767.647361] CPU: 3 PID: 767 Comm: kworker/u8:7 Tainted: G           O 5.15.11 #15\n[  767.655329] Hardware name: DNI AmazonGo1 A7040 board (DT)\n[  767.660760] Workqueue: lacp_1 bond_3ad_state_machine_handler\n[  767.666468] Call trace:\n[  767.668930]  dump_backtrace+0x0/0x2d0\n[  767.672625]  show_stack+0x24/0x30\n[  767.675965]  dump_stack_lvl+0x68/0x84\n[  767.679659]  print_address_description.constprop.0+0x74/0x2b8\n[  767.685451]  kasan_report+0x1f0/0x260\n[  767.689148]  __asan_load2+0x94/0xd0\n[  767.692667]  bond_3ad_state_machine_handler+0x13dc/0x1470",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49667",
          "url": "https://www.suse.com/security/cve/CVE-2022-49667"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238282 for CVE-2022-49667",
          "url": "https://bugzilla.suse.com/1238282"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49667"
    },
    {
      "cve": "CVE-2022-49672",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49672"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: tun: unlink NAPI from device on destruction\n\nSyzbot found a race between tun file and device destruction.\nNAPIs live in struct tun_file which can get destroyed before\nthe netdev so we have to del them explicitly. The current\ncode is missing deleting the NAPI if the queue was detached\nfirst.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49672",
          "url": "https://www.suse.com/security/cve/CVE-2022-49672"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238816 for CVE-2022-49672",
          "url": "https://bugzilla.suse.com/1238816"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49672"
    },
    {
      "cve": "CVE-2022-49673",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49673"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix KASAN warning in raid5_add_disks\n\nThere\u0027s a KASAN warning in raid5_add_disk when running the LVM testsuite.\nThe warning happens in the test\nlvconvert-raid-reshape-linear_to_raid6-single-type.sh. We fix the warning\nby verifying that rdev-\u003esaved_raid_disk is within limits.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49673",
          "url": "https://www.suse.com/security/cve/CVE-2022-49673"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238933 for CVE-2022-49673",
          "url": "https://bugzilla.suse.com/1238933"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49673"
    },
    {
      "cve": "CVE-2022-49674",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49674"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm raid: fix accesses beyond end of raid member array\n\nOn dm-raid table load (using raid_ctr), dm-raid allocates an array\nrs-\u003edevs[rs-\u003eraid_disks] for the raid device members. rs-\u003eraid_disks\nis defined by the number of raid metadata and image tupples passed\ninto the target\u0027s constructor.\n\nIn the case of RAID layout changes being requested, that number can be\ndifferent from the current number of members for existing raid sets as\ndefined in their superblocks. Example RAID layout changes include:\n- raid1 legs being added/removed\n- raid4/5/6/10 number of stripes changed (stripe reshaping)\n- takeover to higher raid level (e.g. raid5 -\u003e raid6)\n\nWhen accessing array members, rs-\u003eraid_disks must be used in control\nloops instead of the potentially larger value in rs-\u003emd.raid_disks.\nOtherwise it will cause memory access beyond the end of the rs-\u003edevs\narray.\n\nFix this by changing code that is prone to out-of-bounds access.\nAlso fix validate_raid_redundancy() to validate all devices that are\nadded. Also, use braces to help clean up raid_iterate_devices().\n\nThe out-of-bounds memory accesses was discovered using KASAN.\n\nThis commit was verified to pass all LVM2 RAID tests (with KASAN\nenabled).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49674",
          "url": "https://www.suse.com/security/cve/CVE-2022-49674"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239041 for CVE-2022-49674",
          "url": "https://bugzilla.suse.com/1239041"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49674"
    },
    {
      "cve": "CVE-2022-49687",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49687"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvirtio_net: fix xdp_rxq_info bug after suspend/resume\n\nThe following sequence currently causes a driver bug warning\nwhen using virtio_net:\n\n  # ip link set eth0 up\n  # echo mem \u003e /sys/power/state (or e.g. # rtcwake -s 10 -m mem)\n  \u003cresume\u003e\n  # ip link set eth0 down\n\n  Missing register, driver bug\n  WARNING: CPU: 0 PID: 375 at net/core/xdp.c:138 xdp_rxq_info_unreg+0x58/0x60\n  Call trace:\n   xdp_rxq_info_unreg+0x58/0x60\n   virtnet_close+0x58/0xac\n   __dev_close_many+0xac/0x140\n   __dev_change_flags+0xd8/0x210\n   dev_change_flags+0x24/0x64\n   do_setlink+0x230/0xdd0\n   ...\n\nThis happens because virtnet_freeze() frees the receive_queue\ncompletely (including struct xdp_rxq_info) but does not call\nxdp_rxq_info_unreg(). Similarly, virtnet_restore() sets up the\nreceive_queue again but does not call xdp_rxq_info_reg().\n\nActually, parts of virtnet_freeze_down() and virtnet_restore_up()\nare almost identical to virtnet_close() and virtnet_open(): only\nthe calls to xdp_rxq_info_(un)reg() are missing. This means that\nwe can fix this easily and avoid such problems in the future by\njust calling virtnet_close()/open() from the freeze/restore handlers.\n\nAside from adding the missing xdp_rxq_info calls the only difference\nis that the refill work is only cancelled if netif_running(). However,\nthis should not make any functional difference since the refill work\nshould only be active if the network interface is actually up.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49687",
          "url": "https://www.suse.com/security/cve/CVE-2022-49687"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238181 for CVE-2022-49687",
          "url": "https://bugzilla.suse.com/1238181"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49687"
    },
    {
      "cve": "CVE-2022-49707",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49707"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: add reserved GDT blocks check\n\nWe capture a NULL pointer issue when resizing a corrupt ext4 image which\nis freshly clear resize_inode feature (not run e2fsck). It could be\nsimply reproduced by following steps. The problem is because of the\nresize_inode feature was cleared, and it will convert the filesystem to\nmeta_bg mode in ext4_resize_fs(), but the es-\u003es_reserved_gdt_blocks was\nnot reduced to zero, so could we mistakenly call reserve_backup_gdb()\nand passing an uninitialized resize_inode to it when adding new group\ndescriptors.\n\n mkfs.ext4 /dev/sda 3G\n tune2fs -O ^resize_inode /dev/sda #forget to run requested e2fsck\n mount /dev/sda /mnt\n resize2fs /dev/sda 8G\n\n ========\n BUG: kernel NULL pointer dereference, address: 0000000000000028\n CPU: 19 PID: 3243 Comm: resize2fs Not tainted 5.18.0-rc7-00001-gfde086c5ebfd #748\n ...\n RIP: 0010:ext4_flex_group_add+0xe08/0x2570\n ...\n Call Trace:\n  \u003cTASK\u003e\n  ext4_resize_fs+0xbec/0x1660\n  __ext4_ioctl+0x1749/0x24e0\n  ext4_ioctl+0x12/0x20\n  __x64_sys_ioctl+0xa6/0x110\n  do_syscall_64+0x3b/0x90\n  entry_SYSCALL_64_after_hwframe+0x44/0xae\n RIP: 0033:0x7f2dd739617b\n ========\n\nThe fix is simple, add a check in ext4_resize_begin() to make sure that\nthe es-\u003es_reserved_gdt_blocks is zero when the resize_inode feature is\ndisabled.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49707",
          "url": "https://www.suse.com/security/cve/CVE-2022-49707"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239035 for CVE-2022-49707",
          "url": "https://bugzilla.suse.com/1239035"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49707"
    },
    {
      "cve": "CVE-2022-49708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\next4: fix bug_on ext4_mb_use_inode_pa\n\nHulk Robot reported a BUG_ON:\n==================================================================\nkernel BUG at fs/ext4/mballoc.c:3211!\n[...]\nRIP: 0010:ext4_mb_mark_diskspace_used.cold+0x85/0x136f\n[...]\nCall Trace:\n ext4_mb_new_blocks+0x9df/0x5d30\n ext4_ext_map_blocks+0x1803/0x4d80\n ext4_map_blocks+0x3a4/0x1a10\n ext4_writepages+0x126d/0x2c30\n do_writepages+0x7f/0x1b0\n __filemap_fdatawrite_range+0x285/0x3b0\n file_write_and_wait_range+0xb1/0x140\n ext4_sync_file+0x1aa/0xca0\n vfs_fsync_range+0xfb/0x260\n do_fsync+0x48/0xa0\n[...]\n==================================================================\n\nAbove issue may happen as follows:\n-------------------------------------\ndo_fsync\n vfs_fsync_range\n  ext4_sync_file\n   file_write_and_wait_range\n    __filemap_fdatawrite_range\n     do_writepages\n      ext4_writepages\n       mpage_map_and_submit_extent\n        mpage_map_one_extent\n         ext4_map_blocks\n          ext4_mb_new_blocks\n           ext4_mb_normalize_request\n            \u003e\u003e\u003e start + size \u003c= ac-\u003eac_o_ex.fe_logical\n           ext4_mb_regular_allocator\n            ext4_mb_simple_scan_group\n             ext4_mb_use_best_found\n              ext4_mb_new_preallocation\n               ext4_mb_new_inode_pa\n                ext4_mb_use_inode_pa\n                 \u003e\u003e\u003e set ac-\u003eac_b_ex.fe_len \u003c= 0\n           ext4_mb_mark_diskspace_used\n            \u003e\u003e\u003e BUG_ON(ac-\u003eac_b_ex.fe_len \u003c= 0);\n\nwe can easily reproduce this problem with the following commands:\n\t`fallocate -l100M disk`\n\t`mkfs.ext4 -b 1024 -g 256 disk`\n\t`mount disk /mnt`\n\t`fsstress -d /mnt -l 0 -n 1000 -p 1`\n\nThe size must be smaller than or equal to EXT4_BLOCKS_PER_GROUP.\nTherefore, \"start + size \u003c= ac-\u003eac_o_ex.fe_logical\" may occur\nwhen the size is truncated. So start should be the start position of\nthe group where ac_o_ex.fe_logical is located after alignment.\nIn addition, when the value of fe_logical or EXT4_BLOCKS_PER_GROUP\nis very large, the value calculated by start_off is more accurate.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49708",
          "url": "https://www.suse.com/security/cve/CVE-2022-49708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238599 for CVE-2022-49708",
          "url": "https://bugzilla.suse.com/1238599"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49708"
    },
    {
      "cve": "CVE-2022-49710",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49710"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndm mirror log: round up region bitmap size to BITS_PER_LONG\n\nThe code in dm-log rounds up bitset_size to 32 bits. It then uses\nfind_next_zero_bit_le on the allocated region. find_next_zero_bit_le\naccesses the bitmap using unsigned long pointers. So, on 64-bit\narchitectures, it may access 4 bytes beyond the allocated size.\n\nFix this bug by rounding up bitset_size to BITS_PER_LONG.\n\nThis bug was found by running the lvm2 testsuite with kasan.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49710",
          "url": "https://www.suse.com/security/cve/CVE-2022-49710"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238417 for CVE-2022-49710",
          "url": "https://bugzilla.suse.com/1238417"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49710"
    },
    {
      "cve": "CVE-2022-49711",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49711"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbus: fsl-mc-bus: fix KASAN use-after-free in fsl_mc_bus_remove()\n\nIn fsl_mc_bus_remove(), mc-\u003eroot_mc_bus_dev-\u003emc_io is passed to\nfsl_destroy_mc_io(). However, mc-\u003eroot_mc_bus_dev is already freed in\nfsl_mc_device_remove(). Then reference to mc-\u003eroot_mc_bus_dev-\u003emc_io\ntriggers KASAN use-after-free. To avoid the use-after-free, keep the\nreference to mc-\u003eroot_mc_bus_dev-\u003emc_io in a local variable and pass to\nfsl_destroy_mc_io().\n\nThis patch needs rework to apply to kernels older than v5.15.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49711",
          "url": "https://www.suse.com/security/cve/CVE-2022-49711"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238416 for CVE-2022-49711",
          "url": "https://bugzilla.suse.com/1238416"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49711"
    },
    {
      "cve": "CVE-2022-49713",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49713"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: dwc2: Fix memory leak in dwc2_hcd_init\n\nusb_create_hcd will alloc memory for hcd, and we should\ncall usb_put_hcd to free it when platform_get_resource()\nfails to prevent memory leak.\ngoto error2 label instead error1 to fix this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49713",
          "url": "https://www.suse.com/security/cve/CVE-2022-49713"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238419 for CVE-2022-49713",
          "url": "https://bugzilla.suse.com/1238419"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49713"
    },
    {
      "cve": "CVE-2022-49727",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49727"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: Fix signed integer overflow in l2tp_ip6_sendmsg\n\nWhen len \u003e= INT_MAX - transhdrlen, ulen = len + transhdrlen will be\noverflow. To fix, we can follow what udpv6 does and subtract the\ntranshdrlen from the max.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49727",
          "url": "https://www.suse.com/security/cve/CVE-2022-49727"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239059 for CVE-2022-49727",
          "url": "https://bugzilla.suse.com/1239059"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.6,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49727"
    },
    {
      "cve": "CVE-2022-49733",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49733"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nALSA: pcm: oss: Fix race at SNDCTL_DSP_SYNC\n\nThere is a small race window at snd_pcm_oss_sync() that is called from\nOSS PCM SNDCTL_DSP_SYNC ioctl; namely the function calls\nsnd_pcm_oss_make_ready() at first, then takes the params_lock mutex\nfor the rest.  When the stream is set up again by another thread\nbetween them, it leads to inconsistency, and may result in unexpected\nresults such as NULL dereference of OSS buffer as a fuzzer spotted\nrecently.\n\nThe fix is simply to cover snd_pcm_oss_make_ready() call into the same\nparams_lock mutex with snd_pcm_oss_make_ready_locked() variant.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49733",
          "url": "https://www.suse.com/security/cve/CVE-2022-49733"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238454 for CVE-2022-49733",
          "url": "https://bugzilla.suse.com/1238454"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49733"
    },
    {
      "cve": "CVE-2022-49740",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2022-49740"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: Check the count value of channel spec to prevent out-of-bounds reads\n\nThis patch fixes slab-out-of-bounds reads in brcmfmac that occur in\nbrcmf_construct_chaninfo() and brcmf_enable_bw40_2g() when the count\nvalue of channel specifications provided by the device is greater than\nthe length of \u0027list-\u003eelement[]\u0027, decided by the size of the \u0027list\u0027\nallocated with kzalloc(). The patch adds checks that make the functions\nfree the buffer and return -EINVAL if that is the case. Note that the\nnegative return is handled by the caller, brcmf_setup_wiphybands() or\nbrcmf_cfg80211_attach().\n\nFound by a modified version of syzkaller.\n\nCrash Report from brcmf_construct_chaninfo():\n==================================================================\nBUG: KASAN: slab-out-of-bounds in brcmf_setup_wiphybands+0x1238/0x1430\nRead of size 4 at addr ffff888115f24600 by task kworker/0:2/1896\n\nCPU: 0 PID: 1896 Comm: kworker/0:2 Tainted: G        W  O      5.14.0+ #132\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.12.1-0-ga5cab58e9a3f-prebuilt.qemu.org 04/01/2014\nWorkqueue: usb_hub_wq hub_event\nCall Trace:\n dump_stack_lvl+0x57/0x7d\n print_address_description.constprop.0.cold+0x93/0x334\n kasan_report.cold+0x83/0xdf\n brcmf_setup_wiphybands+0x1238/0x1430\n brcmf_cfg80211_attach+0x2118/0x3fd0\n brcmf_attach+0x389/0xd40\n brcmf_usb_probe+0x12de/0x1690\n usb_probe_interface+0x25f/0x710\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_set_configuration+0x984/0x1770\n usb_generic_driver_probe+0x69/0x90\n usb_probe_device+0x9c/0x220\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_new_device.cold+0x463/0xf66\n hub_event+0x10d5/0x3330\n process_one_work+0x873/0x13e0\n worker_thread+0x8b/0xd10\n kthread+0x379/0x450\n ret_from_fork+0x1f/0x30\n\nAllocated by task 1896:\n kasan_save_stack+0x1b/0x40\n __kasan_kmalloc+0x7c/0x90\n kmem_cache_alloc_trace+0x19e/0x330\n brcmf_setup_wiphybands+0x290/0x1430\n brcmf_cfg80211_attach+0x2118/0x3fd0\n brcmf_attach+0x389/0xd40\n brcmf_usb_probe+0x12de/0x1690\n usb_probe_interface+0x25f/0x710\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_set_configuration+0x984/0x1770\n usb_generic_driver_probe+0x69/0x90\n usb_probe_device+0x9c/0x220\n really_probe+0x1be/0xa90\n __driver_probe_device+0x2ab/0x460\n driver_probe_device+0x49/0x120\n __device_attach_driver+0x18a/0x250\n bus_for_each_drv+0x123/0x1a0\n __device_attach+0x207/0x330\n bus_probe_device+0x1a2/0x260\n device_add+0xa61/0x1ce0\n usb_new_device.cold+0x463/0xf66\n hub_event+0x10d5/0x3330\n process_one_work+0x873/0x13e0\n worker_thread+0x8b/0xd10\n kthread+0x379/0x450\n ret_from_fork+0x1f/0x30\n\nThe buggy address belongs to the object at ffff888115f24000\n which belongs to the cache kmalloc-2k of size 2048\nThe buggy address is located 1536 bytes inside of\n 2048-byte region [ffff888115f24000, ffff888115f24800)\n\nMemory state around the buggy address:\n ffff888115f24500: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n ffff888115f24580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00\n\u003effff888115f24600: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n                   ^\n ffff888115f24680: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n ffff888115f24700: fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc fc\n==================================================================\n\nCrash Report from brcmf_enable_bw40_2g():\n==========\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2022-49740",
          "url": "https://www.suse.com/security/cve/CVE-2022-49740"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240233 for CVE-2022-49740",
          "url": "https://bugzilla.suse.com/1240233"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2022-49740"
    },
    {
      "cve": "CVE-2023-2162",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-2162"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free vulnerability was found in iscsi_sw_tcp_session_create in drivers/scsi/iscsi_tcp.c in SCSI sub-component in the Linux Kernel. In this flaw an attacker could leak kernel internal information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-2162",
          "url": "https://www.suse.com/security/cve/CVE-2023-2162"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210647 for CVE-2023-2162",
          "url": "https://bugzilla.suse.com/1210647"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1210662 for CVE-2023-2162",
          "url": "https://bugzilla.suse.com/1210662"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213841 for CVE-2023-2162",
          "url": "https://bugzilla.suse.com/1213841"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213842 for CVE-2023-2162",
          "url": "https://bugzilla.suse.com/1213842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1214128 for CVE-2023-2162",
          "url": "https://bugzilla.suse.com/1214128"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1222212 for CVE-2023-2162",
          "url": "https://bugzilla.suse.com/1222212"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-2162"
    },
    {
      "cve": "CVE-2023-3567",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-3567"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "A use-after-free flaw was found in vcs_read in drivers/tty/vt/vc_screen.c in vc_screen in the Linux Kernel. This issue may allow an attacker with local user access to cause a system crash or leak internal kernel information.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-3567",
          "url": "https://www.suse.com/security/cve/CVE-2023-3567"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213167 for CVE-2023-3567",
          "url": "https://bugzilla.suse.com/1213167"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213244 for CVE-2023-3567",
          "url": "https://bugzilla.suse.com/1213244"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1213842 for CVE-2023-3567",
          "url": "https://bugzilla.suse.com/1213842"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1215674 for CVE-2023-3567",
          "url": "https://bugzilla.suse.com/1215674"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217444 for CVE-2023-3567",
          "url": "https://bugzilla.suse.com/1217444"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1217531 for CVE-2023-3567",
          "url": "https://bugzilla.suse.com/1217531"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2023-3567"
    },
    {
      "cve": "CVE-2023-52933",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52933"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nSquashfs: fix handling and sanity checking of xattr_ids count\n\nA Sysbot [1] corrupted filesystem exposes two flaws in the handling and\nsanity checking of the xattr_ids count in the filesystem.  Both of these\nflaws cause computation overflow due to incorrect typing.\n\nIn the corrupted filesystem the xattr_ids value is 4294967071, which\nstored in a signed variable becomes the negative number -225.\n\nFlaw 1 (64-bit systems only):\n\nThe signed integer xattr_ids variable causes sign extension.\n\nThis causes variable overflow in the SQUASHFS_XATTR_*(A) macros.  The\nvariable is first multiplied by sizeof(struct squashfs_xattr_id) where the\ntype of the sizeof operator is \"unsigned long\".\n\nOn a 64-bit system this is 64-bits in size, and causes the negative number\nto be sign extended and widened to 64-bits and then become unsigned.  This\nproduces the very large number 18446744073709548016 or 2^64 - 3600.  This\nnumber when rounded up by SQUASHFS_METADATA_SIZE - 1 (8191 bytes) and\ndivided by SQUASHFS_METADATA_SIZE overflows and produces a length of 0\n(stored in len).\n\nFlaw 2 (32-bit systems only):\n\nOn a 32-bit system the integer variable is not widened by the unsigned\nlong type of the sizeof operator (32-bits), and the signedness of the\nvariable has no effect due it always being treated as unsigned.\n\nThe above corrupted xattr_ids value of 4294967071, when multiplied\noverflows and produces the number 4294963696 or 2^32 - 3400.  This number\nwhen rounded up by SQUASHFS_METADATA_SIZE - 1 (8191 bytes) and divided by\nSQUASHFS_METADATA_SIZE overflows again and produces a length of 0.\n\nThe effect of the 0 length computation:\n\nIn conjunction with the corrupted xattr_ids field, the filesystem also has\na corrupted xattr_table_start value, where it matches the end of\nfilesystem value of 850.\n\nThis causes the following sanity check code to fail because the\nincorrectly computed len of 0 matches the incorrect size of the table\nreported by the superblock (0 bytes).\n\n    len = SQUASHFS_XATTR_BLOCK_BYTES(*xattr_ids);\n    indexes = SQUASHFS_XATTR_BLOCKS(*xattr_ids);\n\n    /*\n     * The computed size of the index table (len bytes) should exactly\n     * match the table start and end points\n    */\n    start = table_start + sizeof(*id_table);\n    end = msblk-\u003ebytes_used;\n\n    if (len != (end - start))\n            return ERR_PTR(-EINVAL);\n\nChanging the xattr_ids variable to be \"usigned int\" fixes the flaw on a\n64-bit system.  This relies on the fact the computation is widened by the\nunsigned long type of the sizeof operator.\n\nCasting the variable to u64 in the above macro fixes this flaw on a 32-bit\nsystem.\n\nIt also means 64-bit systems do not implicitly rely on the type of the\nsizeof operator to widen the computation.\n\n[1] https://lore.kernel.org/lkml/000000000000cd44f005f1a0f17f@google.com/",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52933",
          "url": "https://www.suse.com/security/cve/CVE-2023-52933"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240275 for CVE-2023-52933",
          "url": "https://bugzilla.suse.com/1240275"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52933"
    },
    {
      "cve": "CVE-2023-52935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmm/khugepaged: fix -\u003eanon_vma race\n\nIf an -\u003eanon_vma is attached to the VMA, collapse_and_free_pmd() requires\nit to be locked.\n\nPage table traversal is allowed under any one of the mmap lock, the\nanon_vma lock (if the VMA is associated with an anon_vma), and the\nmapping lock (if the VMA is associated with a mapping); and so to be\nable to remove page tables, we must hold all three of them. \nretract_page_tables() bails out if an -\u003eanon_vma is attached, but does\nthis check before holding the mmap lock (as the comment above the check\nexplains).\n\nIf we racily merged an existing -\u003eanon_vma (shared with a child\nprocess) from a neighboring VMA, subsequent rmap traversals on pages\nbelonging to the child will be able to see the page tables that we are\nconcurrently removing while assuming that nothing else can access them.\n\nRepeat the -\u003eanon_vma check once we hold the mmap lock to ensure that\nthere really is no concurrent page table access.\n\nHitting this bug causes a lockdep warning in collapse_and_free_pmd(),\nin the line \"lockdep_assert_held_write(\u0026vma-\u003eanon_vma-\u003eroot-\u003erwsem)\". \nIt can also lead to use-after-free access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52935",
          "url": "https://www.suse.com/security/cve/CVE-2023-52935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240276 for CVE-2023-52935",
          "url": "https://bugzilla.suse.com/1240276"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52935"
    },
    {
      "cve": "CVE-2023-52973",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52973"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvc_screen: move load of struct vc_data pointer in vcs_read() to avoid UAF\n\nAfter a call to console_unlock() in vcs_read() the vc_data struct can be\nfreed by vc_deallocate(). Because of that, the struct vc_data pointer\nload must be done at the top of while loop in vcs_read() to avoid a UAF\nwhen vcs_size() is called.\n\nSyzkaller reported a UAF in vcs_size().\n\nBUG: KASAN: use-after-free in vcs_size (drivers/tty/vt/vc_screen.c:215)\nRead of size 4 at addr ffff8881137479a8 by task 4a005ed81e27e65/1537\n\nCPU: 0 PID: 1537 Comm: 4a005ed81e27e65 Not tainted 6.2.0-rc5 #1\nHardware name: Red Hat KVM, BIOS 1.15.0-2.module\nCall Trace:\n  \u003cTASK\u003e\n__asan_report_load4_noabort (mm/kasan/report_generic.c:350)\nvcs_size (drivers/tty/vt/vc_screen.c:215)\nvcs_read (drivers/tty/vt/vc_screen.c:415)\nvfs_read (fs/read_write.c:468 fs/read_write.c:450)\n...\n  \u003c/TASK\u003e\n\nAllocated by task 1191:\n...\nkmalloc_trace (mm/slab_common.c:1069)\nvc_allocate (./include/linux/slab.h:580 ./include/linux/slab.h:720\n     drivers/tty/vt/vt.c:1128 drivers/tty/vt/vt.c:1108)\ncon_install (drivers/tty/vt/vt.c:3383)\ntty_init_dev (drivers/tty/tty_io.c:1301 drivers/tty/tty_io.c:1413\n     drivers/tty/tty_io.c:1390)\ntty_open (drivers/tty/tty_io.c:2080 drivers/tty/tty_io.c:2126)\nchrdev_open (fs/char_dev.c:415)\ndo_dentry_open (fs/open.c:883)\nvfs_open (fs/open.c:1014)\n...\n\nFreed by task 1548:\n...\nkfree (mm/slab_common.c:1021)\nvc_port_destruct (drivers/tty/vt/vt.c:1094)\ntty_port_destructor (drivers/tty/tty_port.c:296)\ntty_port_put (drivers/tty/tty_port.c:312)\nvt_disallocate_all (drivers/tty/vt/vt_ioctl.c:662 (discriminator 2))\nvt_ioctl (drivers/tty/vt/vt_ioctl.c:903)\ntty_ioctl (drivers/tty/tty_io.c:2776)\n...\n\nThe buggy address belongs to the object at ffff888113747800\n  which belongs to the cache kmalloc-1k of size 1024\nThe buggy address is located 424 bytes inside of\n  1024-byte region [ffff888113747800, ffff888113747c00)\n\nThe buggy address belongs to the physical page:\npage:00000000b3fe6c7c refcount:1 mapcount:0 mapping:0000000000000000\n     index:0x0 pfn:0x113740\nhead:00000000b3fe6c7c order:3 compound_mapcount:0 subpages_mapcount:0\n     compound_pincount:0\nanon flags: 0x17ffffc0010200(slab|head|node=0|zone=2|lastcpupid=0x1fffff)\nraw: 0017ffffc0010200 ffff888100042dc0 0000000000000000 dead000000000001\nraw: 0000000000000000 0000000000100010 00000001ffffffff 0000000000000000\npage dumped because: kasan: bad access detected\n\nMemory state around the buggy address:\n  ffff888113747880: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff888113747900: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n\u003e ffff888113747980: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n                                   ^\n  ffff888113747a00: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n  ffff888113747a80: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb\n==================================================================\nDisabling lock debugging due to kernel taint",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52973",
          "url": "https://www.suse.com/security/cve/CVE-2023-52973"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240218 for CVE-2023-52973",
          "url": "https://bugzilla.suse.com/1240218"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52973"
    },
    {
      "cve": "CVE-2023-52974",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52974"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: iscsi_tcp: Fix UAF during login when accessing the shost ipaddress\n\nIf during iscsi_sw_tcp_session_create() iscsi_tcp_r2tpool_alloc() fails,\nuserspace could be accessing the host\u0027s ipaddress attr. If we then free the\nsession via iscsi_session_teardown() while userspace is still accessing the\nsession we will hit a use after free bug.\n\nSet the tcp_sw_host-\u003esession after we have completed session creation and\ncan no longer fail.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52974",
          "url": "https://www.suse.com/security/cve/CVE-2023-52974"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240213 for CVE-2023-52974",
          "url": "https://bugzilla.suse.com/1240213"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52974"
    },
    {
      "cve": "CVE-2023-52979",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52979"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nsquashfs: harden sanity check in squashfs_read_xattr_id_table\n\nWhile mounting a corrupted filesystem, a signed integer \u0027*xattr_ids\u0027 can\nbecome less than zero.  This leads to the incorrect computation of \u0027len\u0027\nand \u0027indexes\u0027 values which can cause null-ptr-deref in copy_bio_to_actor()\nor out-of-bounds accesses in the next sanity checks inside\nsquashfs_read_xattr_id_table().\n\nFound by Linux Verification Center (linuxtesting.org) with Syzkaller.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52979",
          "url": "https://www.suse.com/security/cve/CVE-2023-52979"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240282 for CVE-2023-52979",
          "url": "https://bugzilla.suse.com/1240282"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52979"
    },
    {
      "cve": "CVE-2023-52997",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-52997"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: prevent potential spectre v1 gadget in ip_metrics_convert()\n\nif (!type)\n\t\tcontinue;\n\tif (type \u003e RTAX_MAX)\n\t\treturn -EINVAL;\n\t...\n\tmetrics[type - 1] = val;\n\n@type being used as an array index, we need to prevent\ncpu speculation or risk leaking kernel memory content.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-52997",
          "url": "https://www.suse.com/security/cve/CVE-2023-52997"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240303 for CVE-2023-52997",
          "url": "https://bugzilla.suse.com/1240303"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-52997"
    },
    {
      "cve": "CVE-2023-53000",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53000"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: prevent potential spectre v1 gadgets\n\nMost netlink attributes are parsed and validated from\n__nla_validate_parse() or validate_nla()\n\n    u16 type = nla_type(nla);\n\n    if (type == 0 || type \u003e maxtype) {\n        /* error or continue */\n    }\n\n@type is then used as an array index and can be used\nas a Spectre v1 gadget.\n\narray_index_nospec() can be used to prevent leaking\ncontent of kernel memory to malicious users.\n\nThis should take care of vast majority of netlink uses,\nbut an audit is needed to take care of others where\nvalidation is not yet centralized in core netlink functions.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53000",
          "url": "https://www.suse.com/security/cve/CVE-2023-53000"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240227 for CVE-2023-53000",
          "url": "https://bugzilla.suse.com/1240227"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53000"
    },
    {
      "cve": "CVE-2023-53006",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53006"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: Fix oops due to uncleared server-\u003esmbd_conn in reconnect\n\nIn smbd_destroy(), clear the server-\u003esmbd_conn pointer after freeing the\nsmbd_connection struct that it points to so that reconnection doesn\u0027t get\nconfused.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53006",
          "url": "https://www.suse.com/security/cve/CVE-2023-53006"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240208 for CVE-2023-53006",
          "url": "https://bugzilla.suse.com/1240208"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53006"
    },
    {
      "cve": "CVE-2023-53007",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53007"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntracing: Make sure trace_printk() can output as soon as it can be used\n\nCurrently trace_printk() can be used as soon as early_trace_init() is\ncalled from start_kernel(). But if a crash happens, and\n\"ftrace_dump_on_oops\" is set on the kernel command line, all you get will\nbe:\n\n  [    0.456075]   \u003cidle\u003e-0         0dN.2. 347519us : Unknown type 6\n  [    0.456075]   \u003cidle\u003e-0         0dN.2. 353141us : Unknown type 6\n  [    0.456075]   \u003cidle\u003e-0         0dN.2. 358684us : Unknown type 6\n\nThis is because the trace_printk() event (type 6) hasn\u0027t been registered\nyet. That gets done via an early_initcall(), which may be early, but not\nearly enough.\n\nInstead of registering the trace_printk() event (and other ftrace events,\nwhich are not trace events) via an early_initcall(), have them registered at\nthe same time that trace_printk() can be used. This way, if there is a\ncrash before early_initcall(), then the trace_printk()s will actually be\nuseful.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53007",
          "url": "https://www.suse.com/security/cve/CVE-2023-53007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240229 for CVE-2023-53007",
          "url": "https://bugzilla.suse.com/1240229"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53007"
    },
    {
      "cve": "CVE-2023-53008",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53008"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ncifs: fix potential memory leaks in session setup\n\nMake sure to free cifs_ses::auth_key.response before allocating it as\nwe might end up leaking memory in reconnect or mounting.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53008",
          "url": "https://www.suse.com/security/cve/CVE-2023-53008"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240318 for CVE-2023-53008",
          "url": "https://bugzilla.suse.com/1240318"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53008"
    },
    {
      "cve": "CVE-2023-53010",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53010"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbnxt: Do not read past the end of test names\n\nTest names were being concatenated based on a offset beyond the end of\nthe first name, which tripped the buffer overflow detection logic:\n\n detected buffer overflow in strnlen\n [...]\n Call Trace:\n bnxt_ethtool_init.cold+0x18/0x18\n\nRefactor struct hwrm_selftest_qlist_output to use an actual array,\nand adjust the concatenation to use snprintf() rather than a series of\nstrncat() calls.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53010",
          "url": "https://www.suse.com/security/cve/CVE-2023-53010"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240290 for CVE-2023-53010",
          "url": "https://bugzilla.suse.com/1240290"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53010"
    },
    {
      "cve": "CVE-2023-53015",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53015"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nHID: betop: check shape of output reports\n\nbetopff_init() only checks the total sum of the report counts for each\nreport field to be at least 4, but hid_betopff_play() expects 4 report\nfields.\nA device advertising an output report with one field and 4 report counts\nwould pass the check but crash the kernel with a NULL pointer dereference\nin hid_betopff_play().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53015",
          "url": "https://www.suse.com/security/cve/CVE-2023-53015"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240288 for CVE-2023-53015",
          "url": "https://bugzilla.suse.com/1240288"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53015"
    },
    {
      "cve": "CVE-2023-53019",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53019"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: mdio: validate parameter addr in mdiobus_get_phy()\n\nThe caller may pass any value as addr, what may result in an out-of-bounds\naccess to array mdio_map. One existing case is stmmac_init_phy() that\nmay pass -1 as addr. Therefore validate addr before using it.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53019",
          "url": "https://www.suse.com/security/cve/CVE-2023-53019"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240286 for CVE-2023-53019",
          "url": "https://bugzilla.suse.com/1240286"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53019"
    },
    {
      "cve": "CVE-2023-53024",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53024"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nbpf: Fix pointer-leak due to insufficient speculative store bypass mitigation\n\nTo mitigate Spectre v4, 2039f26f3aca (\"bpf: Fix leakage due to\ninsufficient speculative store bypass mitigation\") inserts lfence\ninstructions after 1) initializing a stack slot and 2) spilling a\npointer to the stack.\n\nHowever, this does not cover cases where a stack slot is first\ninitialized with a pointer (subject to sanitization) but then\noverwritten with a scalar (not subject to sanitization because\nthe slot was already initialized). In this case, the second write\nmay be subject to speculative store bypass (SSB) creating a\nspeculative pointer-as-scalar type confusion. This allows the\nprogram to subsequently leak the numerical pointer value using,\nfor example, a branch-based cache side channel.\n\nTo fix this, also sanitize scalars if they write a stack slot\nthat previously contained a pointer. Assuming that pointer-spills\nare only generated by LLVM on register-pressure, the performance\nimpact on most real-world BPF programs should be small.\n\nThe following unprivileged BPF bytecode drafts a minimal exploit\nand the mitigation:\n\n  [...]\n  // r6 = 0 or 1 (skalar, unknown user input)\n  // r7 = accessible ptr for side channel\n  // r10 = frame pointer (fp), to be leaked\n  //\n  r9 = r10 # fp alias to encourage ssb\n  *(u64 *)(r9 - 8) = r10 // fp[-8] = ptr, to be leaked\n  // lfence added here because of pointer spill to stack.\n  //\n  // Ommitted: Dummy bpf_ringbuf_output() here to train alias predictor\n  // for no r9-r10 dependency.\n  //\n  *(u64 *)(r10 - 8) = r6 // fp[-8] = scalar, overwrites ptr\n  // 2039f26f3aca: no lfence added because stack slot was not STACK_INVALID,\n  // store may be subject to SSB\n  //\n  // fix: also add an lfence when the slot contained a ptr\n  //\n  r8 = *(u64 *)(r9 - 8)\n  // r8 = architecturally a scalar, speculatively a ptr\n  //\n  // leak ptr using branch-based cache side channel:\n  r8 \u0026= 1 // choose bit to leak\n  if r8 == 0 goto SLOW // no mispredict\n  // architecturally dead code if input r6 is 0,\n  // only executes speculatively iff ptr bit is 1\n  r8 = *(u64 *)(r7 + 0) # encode bit in cache (0: slow, 1: fast)\nSLOW:\n  [...]\n\nAfter running this, the program can time the access to *(r7 + 0) to\ndetermine whether the chosen pointer bit was 0 or 1. Repeat this 64\ntimes to recover the whole address on amd64.\n\nIn summary, sanitization can only be skipped if one scalar is\noverwritten with another scalar. Scalar-confusion due to speculative\nstore bypass can not lead to invalid accesses because the pointer\nbounds deducted during verification are enforced using branchless\nlogic. See 979d63d50c0c (\"bpf: prevent out of bounds speculation on\npointer arithmetic\") for details.\n\nDo not make the mitigation depend on !env-\u003eallow_{uninit_stack,ptr_leaks}\nbecause speculative leaks are likely unexpected if these were enabled.\nFor example, leaking the address to a protected log file may be acceptable\nwhile disabling the mitigation might unintentionally leak the address\ninto the cached-state of a map that is accessible to unprivileged\nprocesses.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53024",
          "url": "https://www.suse.com/security/cve/CVE-2023-53024"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240272 for CVE-2023-53024",
          "url": "https://bugzilla.suse.com/1240272"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53024"
    },
    {
      "cve": "CVE-2023-53031",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2023-53031"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npowerpc/imc-pmu: Fix use of mutex in IRQs disabled section\n\nCurrent imc-pmu code triggers a WARNING with CONFIG_DEBUG_ATOMIC_SLEEP\nand CONFIG_PROVE_LOCKING enabled, while running a thread_imc event.\n\nCommand to trigger the warning:\n  # perf stat -e thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/ sleep 5\n\n   Performance counter stats for \u0027sleep 5\u0027:\n\n                   0      thread_imc/CPM_CS_FROM_L4_MEM_X_DPTEG/\n\n         5.002117947 seconds time elapsed\n\n         0.000131000 seconds user\n         0.001063000 seconds sys\n\nBelow is snippet of the warning in dmesg:\n\n  BUG: sleeping function called from invalid context at kernel/locking/mutex.c:580\n  in_atomic(): 1, irqs_disabled(): 1, non_block: 0, pid: 2869, name: perf-exec\n  preempt_count: 2, expected: 0\n  4 locks held by perf-exec/2869:\n   #0: c00000004325c540 (\u0026sig-\u003ecred_guard_mutex){+.+.}-{3:3}, at: bprm_execve+0x64/0xa90\n   #1: c00000004325c5d8 (\u0026sig-\u003eexec_update_lock){++++}-{3:3}, at: begin_new_exec+0x460/0xef0\n   #2: c0000003fa99d4e0 (\u0026cpuctx_lock){-...}-{2:2}, at: perf_event_exec+0x290/0x510\n   #3: c000000017ab8418 (\u0026ctx-\u003elock){....}-{2:2}, at: perf_event_exec+0x29c/0x510\n  irq event stamp: 4806\n  hardirqs last  enabled at (4805): [\u003cc000000000f65b94\u003e] _raw_spin_unlock_irqrestore+0x94/0xd0\n  hardirqs last disabled at (4806): [\u003cc0000000003fae44\u003e] perf_event_exec+0x394/0x510\n  softirqs last  enabled at (0): [\u003cc00000000013c404\u003e] copy_process+0xc34/0x1ff0\n  softirqs last disabled at (0): [\u003c0000000000000000\u003e] 0x0\n  CPU: 36 PID: 2869 Comm: perf-exec Not tainted 6.2.0-rc2-00011-g1247637727f2 #61\n  Hardware name: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 PowerNV\n  Call Trace:\n    dump_stack_lvl+0x98/0xe0 (unreliable)\n    __might_resched+0x2f8/0x310\n    __mutex_lock+0x6c/0x13f0\n    thread_imc_event_add+0xf4/0x1b0\n    event_sched_in+0xe0/0x210\n    merge_sched_in+0x1f0/0x600\n    visit_groups_merge.isra.92.constprop.166+0x2bc/0x6c0\n    ctx_flexible_sched_in+0xcc/0x140\n    ctx_sched_in+0x20c/0x2a0\n    ctx_resched+0x104/0x1c0\n    perf_event_exec+0x340/0x510\n    begin_new_exec+0x730/0xef0\n    load_elf_binary+0x3f8/0x1e10\n  ...\n  do not call blocking ops when !TASK_RUNNING; state=2001 set at [\u003c00000000fd63e7cf\u003e] do_nanosleep+0x60/0x1a0\n  WARNING: CPU: 36 PID: 2869 at kernel/sched/core.c:9912 __might_sleep+0x9c/0xb0\n  CPU: 36 PID: 2869 Comm: sleep Tainted: G        W          6.2.0-rc2-00011-g1247637727f2 #61\n  Hardware name: 8375-42A POWER9 0x4e1202 opal:v7.0-16-g9b85f7d961 PowerNV\n  NIP:  c000000000194a1c LR: c000000000194a18 CTR: c000000000a78670\n  REGS: c00000004d2134e0 TRAP: 0700   Tainted: G        W           (6.2.0-rc2-00011-g1247637727f2)\n  MSR:  9000000000021033 \u003cSF,HV,ME,IR,DR,RI,LE\u003e  CR: 48002824  XER: 00000000\n  CFAR: c00000000013fb64 IRQMASK: 1\n\nThe above warning triggered because the current imc-pmu code uses mutex\nlock in interrupt disabled sections. The function mutex_lock()\ninternally calls __might_resched(), which will check if IRQs are\ndisabled and in case IRQs are disabled, it will trigger the warning.\n\nFix the issue by changing the mutex lock to spinlock.\n\n[mpe: Fix comments, trim oops in change log, add reported-by tags]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2023-53031",
          "url": "https://www.suse.com/security/cve/CVE-2023-53031"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240285 for CVE-2023-53031",
          "url": "https://bugzilla.suse.com/1240285"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2023-53031"
    },
    {
      "cve": "CVE-2024-35910",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-35910"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp: properly terminate timers for kernel sockets\n\nWe had various syzbot reports about tcp timers firing after\nthe corresponding netns has been dismantled.\n\nFortunately Josef Bacik could trigger the issue more often,\nand could test a patch I wrote two years ago.\n\nWhen TCP sockets are closed, we call inet_csk_clear_xmit_timers()\nto \u0027stop\u0027 the timers.\n\ninet_csk_clear_xmit_timers() can be called from any context,\nincluding when socket lock is held.\nThis is the reason it uses sk_stop_timer(), aka del_timer().\nThis means that ongoing timers might finish much later.\n\nFor user sockets, this is fine because each running timer\nholds a reference on the socket, and the user socket holds\na reference on the netns.\n\nFor kernel sockets, we risk that the netns is freed before\ntimer can complete, because kernel sockets do not hold\nreference on the netns.\n\nThis patch adds inet_csk_clear_xmit_timers_sync() function\nthat using sk_stop_timer_sync() to make sure all timers\nare terminated before the kernel socket is released.\nModules using kernel sockets close them in their netns exit()\nhandler.\n\nAlso add sock_not_owned_by_me() helper to get LOCKDEP\nsupport : inet_csk_clear_xmit_timers_sync() must not be called\nwhile socket lock is held.\n\nIt is very possible we can revert in the future commit\n3a58f13a881e (\"net: rds: acquire refcount on TCP sockets\")\nwhich attempted to solve the issue in rds only.\n(net/smc/af_smc.c and net/mptcp/subflow.c have similar code)\n\nWe probably can remove the check_net() tests from\ntcp_out_of_resources() and __tcp_close() in the future.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-35910",
          "url": "https://www.suse.com/security/cve/CVE-2024-35910"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1224489 for CVE-2024-35910",
          "url": "https://bugzilla.suse.com/1224489"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-35910"
    },
    {
      "cve": "CVE-2024-36968",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-36968"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix div-by-zero in l2cap_le_flowctl_init()\n\nl2cap_le_flowctl_init() can cause both div-by-zero and an integer\noverflow since hdev-\u003ele_mtu may not fall in the valid range.\n\nMove MTU from hci_dev to hci_conn to validate MTU and stop the connection\nprocess earlier if MTU is invalid.\nAlso, add a missing validation in read_buffer_size() and make it return\nan error value if the validation fails.\nNow hci_conn_add() returns ERR_PTR() as it can fail due to the both a\nkzalloc failure and invalid MTU value.\n\ndivide error: 0000 [#1] PREEMPT SMP KASAN NOPTI\nCPU: 0 PID: 67 Comm: kworker/u5:0 Tainted: G        W          6.9.0-rc5+ #20\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nWorkqueue: hci0 hci_rx_work\nRIP: 0010:l2cap_le_flowctl_init+0x19e/0x3f0 net/bluetooth/l2cap_core.c:547\nCode: e8 17 17 0c 00 66 41 89 9f 84 00 00 00 bf 01 00 00 00 41 b8 02 00 00 00 4c\n89 fe 4c 89 e2 89 d9 e8 27 17 0c 00 44 89 f0 31 d2 \u003c66\u003e f7 f3 89 c3 ff c3 4d 8d\nb7 88 00 00 00 4c 89 f0 48 c1 e8 03 42\nRSP: 0018:ffff88810bc0f858 EFLAGS: 00010246\nRAX: 00000000000002a0 RBX: 0000000000000000 RCX: dffffc0000000000\nRDX: 0000000000000000 RSI: ffff88810bc0f7c0 RDI: ffffc90002dcb66f\nRBP: ffff88810bc0f880 R08: aa69db2dda70ff01 R09: 0000ffaaaaaaaaaa\nR10: 0084000000ffaaaa R11: 0000000000000000 R12: ffff88810d65a084\nR13: dffffc0000000000 R14: 00000000000002a0 R15: ffff88810d65a000\nFS:  0000000000000000(0000) GS:ffff88811ac00000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000000020000100 CR3: 0000000103268003 CR4: 0000000000770ef0\nPKRU: 55555554\nCall Trace:\n \u003cTASK\u003e\n l2cap_le_connect_req net/bluetooth/l2cap_core.c:4902 [inline]\n l2cap_le_sig_cmd net/bluetooth/l2cap_core.c:5420 [inline]\n l2cap_le_sig_channel net/bluetooth/l2cap_core.c:5486 [inline]\n l2cap_recv_frame+0xe59d/0x11710 net/bluetooth/l2cap_core.c:6809\n l2cap_recv_acldata+0x544/0x10a0 net/bluetooth/l2cap_core.c:7506\n hci_acldata_packet net/bluetooth/hci_core.c:3939 [inline]\n hci_rx_work+0x5e5/0xb20 net/bluetooth/hci_core.c:4176\n process_one_work kernel/workqueue.c:3254 [inline]\n process_scheduled_works+0x90f/0x1530 kernel/workqueue.c:3335\n worker_thread+0x926/0xe70 kernel/workqueue.c:3416\n kthread+0x2e3/0x380 kernel/kthread.c:388\n ret_from_fork+0x5c/0x90 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \u003c/TASK\u003e\nModules linked in:\n---[ end trace 0000000000000000 ]---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-36968",
          "url": "https://www.suse.com/security/cve/CVE-2024-36968"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226130 for CVE-2024-36968",
          "url": "https://bugzilla.suse.com/1226130"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-36968"
    },
    {
      "cve": "CVE-2024-38559",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-38559"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nscsi: qedf: Ensure the copied buf is NUL terminated\n\nCurrently, we allocate a count-sized kernel buffer and copy count from\nuserspace to that buffer. Later, we use kstrtouint on this buffer but we\ndon\u0027t ensure that the string is terminated inside the buffer, this can\nlead to OOB read when using kstrtouint. Fix this issue by using\nmemdup_user_nul instead of memdup_user.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-38559",
          "url": "https://www.suse.com/security/cve/CVE-2024-38559"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1226785 for CVE-2024-38559",
          "url": "https://bugzilla.suse.com/1226785"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227495 for CVE-2024-38559",
          "url": "https://bugzilla.suse.com/1227495"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-38559"
    },
    {
      "cve": "CVE-2024-41005",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-41005"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetpoll: Fix race condition in netpoll_owner_active\n\nKCSAN detected a race condition in netpoll:\n\n\tBUG: KCSAN: data-race in net_rx_action / netpoll_send_skb\n\twrite (marked) to 0xffff8881164168b0 of 4 bytes by interrupt on cpu 10:\n\tnet_rx_action (./include/linux/netpoll.h:90 net/core/dev.c:6712 net/core/dev.c:6822)\n\u003csnip\u003e\n\tread to 0xffff8881164168b0 of 4 bytes by task 1 on cpu 2:\n\tnetpoll_send_skb (net/core/netpoll.c:319 net/core/netpoll.c:345 net/core/netpoll.c:393)\n\tnetpoll_send_udp (net/core/netpoll.c:?)\n\u003csnip\u003e\n\tvalue changed: 0x0000000a -\u003e 0xffffffff\n\nThis happens because netpoll_owner_active() needs to check if the\ncurrent CPU is the owner of the lock, touching napi-\u003epoll_owner\nnon atomically. The -\u003epoll_owner field contains the current CPU holding\nthe lock.\n\nUse an atomic read to check if the poll owner is the current CPU.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-41005",
          "url": "https://www.suse.com/security/cve/CVE-2024-41005"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1227858 for CVE-2024-41005",
          "url": "https://bugzilla.suse.com/1227858"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-41005"
    },
    {
      "cve": "CVE-2024-47678",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-47678"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nicmp: change the order of rate limits\n\nICMP messages are ratelimited :\n\nAfter the blamed commits, the two rate limiters are applied in this order:\n\n1) host wide ratelimit (icmp_global_allow())\n\n2) Per destination ratelimit (inetpeer based)\n\nIn order to avoid side-channels attacks, we need to apply\nthe per destination check first.\n\nThis patch makes the following change :\n\n1) icmp_global_allow() checks if the host wide limit is reached.\n   But credits are not yet consumed. This is deferred to 3)\n\n2) The per destination limit is checked/updated.\n   This might add a new node in inetpeer tree.\n\n3) icmp_global_consume() consumes tokens if prior operations succeeded.\n\nThis means that host wide ratelimit is still effective\nin keeping inetpeer tree small even under DDOS.\n\nAs a bonus, I removed icmp_global.lock as the fast path\ncan use a lock-free operation.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-47678",
          "url": "https://www.suse.com/security/cve/CVE-2024-47678"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1231854 for CVE-2024-47678",
          "url": "https://bugzilla.suse.com/1231854"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-47678"
    },
    {
      "cve": "CVE-2024-49571",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49571"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: check iparea_offset and ipv6_prefixes_cnt when receiving proposal msg\n\nWhen receiving proposal msg in server, the field iparea_offset\nand the field ipv6_prefixes_cnt in proposal msg are from the\nremote client and can not be fully trusted. Especially the\nfield iparea_offset, once exceed the max value, there has the\nchance to access wrong address, and crash may happen.\n\nThis patch checks iparea_offset and ipv6_prefixes_cnt before using them.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49571",
          "url": "https://www.suse.com/security/cve/CVE-2024-49571"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235733 for CVE-2024-49571",
          "url": "https://bugzilla.suse.com/1235733"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49571"
    },
    {
      "cve": "CVE-2024-49935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nACPI: PAD: fix crash in exit_round_robin()\n\nThe kernel occasionally crashes in cpumask_clear_cpu(), which is called\nwithin exit_round_robin(), because when executing clear_bit(nr, addr) with\nnr set to 0xffffffff, the address calculation may cause misalignment within\nthe memory, leading to access to an invalid memory address.\n\n----------\nBUG: unable to handle kernel paging request at ffffffffe0740618\n        ...\nCPU: 3 PID: 2919323 Comm: acpi_pad/14 Kdump: loaded Tainted: G           OE  X --------- -  - 4.18.0-425.19.2.el8_7.x86_64 #1\n        ...\nRIP: 0010:power_saving_thread+0x313/0x411 [acpi_pad]\nCode: 89 cd 48 89 d3 eb d1 48 c7 c7 55 70 72 c0 e8 64 86 b0 e4 c6 05 0d a1 02 00 01 e9 bc fd ff ff 45 89 e4 42 8b 04 a5 20 82 72 c0 \u003cf0\u003e 48 0f b3 05 f4 9c 01 00 42 c7 04 a5 20 82 72 c0 ff ff ff ff 31\nRSP: 0018:ff72a5d51fa77ec8 EFLAGS: 00010202\nRAX: 00000000ffffffff RBX: ff462981e5d8cb80 RCX: 0000000000000000\nRDX: 0000000000000000 RSI: 0000000000000246 RDI: 0000000000000246\nRBP: ff46297556959d80 R08: 0000000000000382 R09: ff46297c8d0f38d8\nR10: 0000000000000000 R11: 0000000000000001 R12: 000000000000000e\nR13: 0000000000000000 R14: ffffffffffffffff R15: 000000000000000e\nFS:  0000000000000000(0000) GS:ff46297a800c0000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: ffffffffe0740618 CR3: 0000007e20410004 CR4: 0000000000771ee0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n ? acpi_pad_add+0x120/0x120 [acpi_pad]\n kthread+0x10b/0x130\n ? set_kthread_struct+0x50/0x50\n ret_from_fork+0x1f/0x40\n        ...\nCR2: ffffffffe0740618\n\ncrash\u003e dis -lr ffffffffc0726923\n        ...\n/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 114\n0xffffffffc0726918 \u003cpower_saving_thread+776\u003e:\tmov    %r12d,%r12d\n/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./include/linux/cpumask.h: 325\n0xffffffffc072691b \u003cpower_saving_thread+779\u003e:\tmov    -0x3f8d7de0(,%r12,4),%eax\n/usr/src/debug/kernel-4.18.0-425.19.2.el8_7/linux-4.18.0-425.19.2.el8_7.x86_64/./arch/x86/include/asm/bitops.h: 80\n0xffffffffc0726923 \u003cpower_saving_thread+787\u003e:\tlock btr %rax,0x19cf4(%rip)        # 0xffffffffc0740620 \u003cpad_busy_cpus_bits\u003e\n\ncrash\u003e px tsk_in_cpu[14]\n$66 = 0xffffffff\n\ncrash\u003e px 0xffffffffc072692c+0x19cf4\n$99 = 0xffffffffc0740620\n\ncrash\u003e sym 0xffffffffc0740620\nffffffffc0740620 (b) pad_busy_cpus_bits [acpi_pad]\n\ncrash\u003e px pad_busy_cpus_bits[0]\n$42 = 0xfffc0\n----------\n\nTo fix this, ensure that tsk_in_cpu[tsk_index] != -1 before calling\ncpumask_clear_cpu() in exit_round_robin(), just as it is done in\nround_robin_cpu().\n\n[ rjw: Subject edit, avoid updates to the same value ]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49935",
          "url": "https://www.suse.com/security/cve/CVE-2024-49935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232370 for CVE-2024-49935",
          "url": "https://bugzilla.suse.com/1232370"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49935"
    },
    {
      "cve": "CVE-2024-49940",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-49940"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nl2tp: prevent possible tunnel refcount underflow\n\nWhen a session is created, it sets a backpointer to its tunnel. When\nthe session refcount drops to 0, l2tp_session_free drops the tunnel\nrefcount if session-\u003etunnel is non-NULL. However, session-\u003etunnel is\nset in l2tp_session_create, before the tunnel refcount is incremented\nby l2tp_session_register, which leaves a small window where\nsession-\u003etunnel is non-NULL when the tunnel refcount hasn\u0027t been\nbumped.\n\nMoving the assignment to l2tp_session_register is trivial but\nl2tp_session_create calls l2tp_session_set_header_len which uses\nsession-\u003etunnel to get the tunnel\u0027s encap. Add an encap arg to\nl2tp_session_set_header_len to avoid using session-\u003etunnel.\n\nIf l2tpv3 sessions have colliding IDs, it is possible for\nl2tp_v3_session_get to race with l2tp_session_register and fetch a\nsession which doesn\u0027t yet have session-\u003etunnel set. Add a check for\nthis case.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-49940",
          "url": "https://www.suse.com/security/cve/CVE-2024-49940"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1232812 for CVE-2024-49940",
          "url": "https://bugzilla.suse.com/1232812"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-49940"
    },
    {
      "cve": "CVE-2024-50269",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50269"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: musb: sunxi: Fix accessing an released usb phy\n\nCommit 6ed05c68cbca (\"usb: musb: sunxi: Explicitly release USB PHY on\nexit\") will cause that usb phy @glue-\u003exceiv is accessed after released.\n\n1) register platform driver @sunxi_musb_driver\n// get the usb phy @glue-\u003exceiv\nsunxi_musb_probe() -\u003e devm_usb_get_phy().\n\n2) register and unregister platform driver @musb_driver\nmusb_probe() -\u003e sunxi_musb_init()\nuse the phy here\n//the phy is released here\nmusb_remove() -\u003e sunxi_musb_exit() -\u003e devm_usb_put_phy()\n\n3) register @musb_driver again\nmusb_probe() -\u003e sunxi_musb_init()\nuse the phy here but the phy has been released at 2).\n...\n\nFixed by reverting the commit, namely, removing devm_usb_put_phy()\nfrom sunxi_musb_exit().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50269",
          "url": "https://www.suse.com/security/cve/CVE-2024-50269"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233458 for CVE-2024-50269",
          "url": "https://bugzilla.suse.com/1233458"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 4.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-50269"
    },
    {
      "cve": "CVE-2024-50290",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-50290"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: cx24116: prevent overflows on SNR calculus\n\nas reported by Coverity, if reading SNR registers fail, a negative\nnumber will be returned, causing an underflow when reading SNR\nregisters.\n\nPrevent that.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-50290",
          "url": "https://www.suse.com/security/cve/CVE-2024-50290"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225742 for CVE-2024-50290",
          "url": "https://bugzilla.suse.com/1225742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233479 for CVE-2024-50290",
          "url": "https://bugzilla.suse.com/1233479"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233681 for CVE-2024-50290",
          "url": "https://bugzilla.suse.com/1233681"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-50290"
    },
    {
      "cve": "CVE-2024-53063",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53063"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nmedia: dvbdev: prevent the risk of out of memory access\n\nThe dvbdev contains a static variable used to store dvb minors.\n\nThe behavior of it depends if CONFIG_DVB_DYNAMIC_MINORS is set\nor not. When not set, dvb_register_device() won\u0027t check for\nboundaries, as it will rely that a previous call to\ndvb_register_adapter() would already be enforcing it.\n\nOn a similar way, dvb_device_open() uses the assumption\nthat the register functions already did the needed checks.\n\nThis can be fragile if some device ends using different\ncalls. This also generate warnings on static check analysers\nlike Coverity.\n\nSo, add explicit guards to prevent potential risk of OOM issues.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53063",
          "url": "https://www.suse.com/security/cve/CVE-2024-53063"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1225742 for CVE-2024-53063",
          "url": "https://bugzilla.suse.com/1225742"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233557 for CVE-2024-53063",
          "url": "https://bugzilla.suse.com/1233557"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1233619 for CVE-2024-53063",
          "url": "https://bugzilla.suse.com/1233619"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.1,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-53063"
    },
    {
      "cve": "CVE-2024-53124",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53124"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: fix data-races around sk-\u003esk_forward_alloc\n\nSyzkaller reported this warning:\n ------------[ cut here ]------------\n WARNING: CPU: 0 PID: 16 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x1c5/0x1e0\n Modules linked in:\n CPU: 0 UID: 0 PID: 16 Comm: ksoftirqd/0 Not tainted 6.12.0-rc5 #26\n Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\n RIP: 0010:inet_sock_destruct+0x1c5/0x1e0\n Code: 24 12 4c 89 e2 5b 48 c7 c7 98 ec bb 82 41 5c e9 d1 18 17 ff 4c 89 e6 5b 48 c7 c7 d0 ec bb 82 41 5c e9 bf 18 17 ff 0f 0b eb 83 \u003c0f\u003e 0b eb 97 0f 0b eb 87 0f 0b e9 68 ff ff ff 66 66 2e 0f 1f 84 00\n RSP: 0018:ffffc9000008bd90 EFLAGS: 00010206\n RAX: 0000000000000300 RBX: ffff88810b172a90 RCX: 0000000000000007\n RDX: 0000000000000002 RSI: 0000000000000300 RDI: ffff88810b172a00\n RBP: ffff88810b172a00 R08: ffff888104273c00 R09: 0000000000100007\n R10: 0000000000020000 R11: 0000000000000006 R12: ffff88810b172a00\n R13: 0000000000000004 R14: 0000000000000000 R15: ffff888237c31f78\n FS:  0000000000000000(0000) GS:ffff888237c00000(0000) knlGS:0000000000000000\n CS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\n CR2: 00007ffc63fecac8 CR3: 000000000342e000 CR4: 00000000000006f0\n DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\n DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\n Call Trace:\n  \u003cTASK\u003e\n  ? __warn+0x88/0x130\n  ? inet_sock_destruct+0x1c5/0x1e0\n  ? report_bug+0x18e/0x1a0\n  ? handle_bug+0x53/0x90\n  ? exc_invalid_op+0x18/0x70\n  ? asm_exc_invalid_op+0x1a/0x20\n  ? inet_sock_destruct+0x1c5/0x1e0\n  __sk_destruct+0x2a/0x200\n  rcu_do_batch+0x1aa/0x530\n  ? rcu_do_batch+0x13b/0x530\n  rcu_core+0x159/0x2f0\n  handle_softirqs+0xd3/0x2b0\n  ? __pfx_smpboot_thread_fn+0x10/0x10\n  run_ksoftirqd+0x25/0x30\n  smpboot_thread_fn+0xdd/0x1d0\n  kthread+0xd3/0x100\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork+0x34/0x50\n  ? __pfx_kthread+0x10/0x10\n  ret_from_fork_asm+0x1a/0x30\n  \u003c/TASK\u003e\n ---[ end trace 0000000000000000 ]---\n\nIts possible that two threads call tcp_v6_do_rcv()/sk_forward_alloc_add()\nconcurrently when sk-\u003esk_state == TCP_LISTEN with sk-\u003esk_lock unlocked,\nwhich triggers a data-race around sk-\u003esk_forward_alloc:\ntcp_v6_rcv\n    tcp_v6_do_rcv\n        skb_clone_and_charge_r\n            sk_rmem_schedule\n                __sk_mem_schedule\n                    sk_forward_alloc_add()\n            skb_set_owner_r\n                sk_mem_charge\n                    sk_forward_alloc_add()\n        __kfree_skb\n            skb_release_all\n                skb_release_head_state\n                    sock_rfree\n                        sk_mem_uncharge\n                            sk_forward_alloc_add()\n                            sk_mem_reclaim\n                                // set local var reclaimable\n                                __sk_mem_reclaim\n                                    sk_forward_alloc_add()\n\nIn this syzkaller testcase, two threads call\ntcp_v6_do_rcv() with skb-\u003etruesize=768, the sk_forward_alloc changes like\nthis:\n (cpu 1)             | (cpu 2)             | sk_forward_alloc\n ...                 | ...                 | 0\n __sk_mem_schedule() |                     | +4096 = 4096\n                     | __sk_mem_schedule() | +4096 = 8192\n sk_mem_charge()     |                     | -768  = 7424\n                     | sk_mem_charge()     | -768  = 6656\n ...                 |    ...              |\n sk_mem_uncharge()   |                     | +768  = 7424\n reclaimable=7424    |                     |\n                     | sk_mem_uncharge()   | +768  = 8192\n                     | reclaimable=8192    |\n __sk_mem_reclaim()  |                     | -4096 = 4096\n                     | __sk_mem_reclaim()  | -8192 = -4096 != 0\n\nThe skb_clone_and_charge_r() should not be called in tcp_v6_do_rcv() when\nsk-\u003esk_state is TCP_LISTEN, it happens later in tcp_v6_syn_recv_sock().\nFix the same issue in dccp_v6_do_rcv().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53124",
          "url": "https://www.suse.com/security/cve/CVE-2024-53124"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234074 for CVE-2024-53124",
          "url": "https://bugzilla.suse.com/1234074"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-53124"
    },
    {
      "cve": "CVE-2024-53140",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53140"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetlink: terminate outstanding dump on socket close\n\nNetlink supports iterative dumping of data. It provides the families\nthe following ops:\n - start - (optional) kicks off the dumping process\n - dump  - actual dump helper, keeps getting called until it returns 0\n - done  - (optional) pairs with .start, can be used for cleanup\nThe whole process is asynchronous and the repeated calls to .dump\ndon\u0027t actually happen in a tight loop, but rather are triggered\nin response to recvmsg() on the socket.\n\nThis gives the user full control over the dump, but also means that\nthe user can close the socket without getting to the end of the dump.\nTo make sure .start is always paired with .done we check if there\nis an ongoing dump before freeing the socket, and if so call .done.\n\nThe complication is that sockets can get freed from BH and .done\nis allowed to sleep. So we use a workqueue to defer the call, when\nneeded.\n\nUnfortunately this does not work correctly. What we defer is not\nthe cleanup but rather releasing a reference on the socket.\nWe have no guarantee that we own the last reference, if someone\nelse holds the socket they may release it in BH and we\u0027re back\nto square one.\n\nThe whole dance, however, appears to be unnecessary. Only the user\ncan interact with dumps, so we can clean up when socket is closed.\nAnd close always happens in process context. Some async code may\nstill access the socket after close, queue notification skbs to it etc.\nbut no dumps can start, end or otherwise make progress.\n\nDelete the workqueue and flush the dump state directly from the release\nhandler. Note that further cleanup is possible in -next, for instance\nwe now always call .done before releasing the main module reference,\nso dump doesn\u0027t have to take a reference of its own.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53140",
          "url": "https://www.suse.com/security/cve/CVE-2024-53140"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1234222 for CVE-2024-53140",
          "url": "https://bugzilla.suse.com/1234222"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-53140"
    },
    {
      "cve": "CVE-2024-53680",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-53680"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvs: fix UB due to uninitialized stack access in ip_vs_protocol_init()\n\nUnder certain kernel configurations when building with Clang/LLVM, the\ncompiler does not generate a return or jump as the terminator\ninstruction for ip_vs_protocol_init(), triggering the following objtool\nwarning during build time:\n\n  vmlinux.o: warning: objtool: ip_vs_protocol_init() falls through to next function __initstub__kmod_ip_vs_rr__935_123_ip_vs_rr_init6()\n\nAt runtime, this either causes an oops when trying to load the ipvs\nmodule or a boot-time panic if ipvs is built-in. This same issue has\nbeen reported by the Intel kernel test robot previously.\n\nDigging deeper into both LLVM and the kernel code reveals this to be a\nundefined behavior problem. ip_vs_protocol_init() uses a on-stack buffer\nof 64 chars to store the registered protocol names and leaves it\nuninitialized after definition. The function calls strnlen() when\nconcatenating protocol names into the buffer. With CONFIG_FORTIFY_SOURCE\nstrnlen() performs an extra step to check whether the last byte of the\ninput char buffer is a null character (commit 3009f891bb9f (\"fortify:\nAllow strlen() and strnlen() to pass compile-time known lengths\")).\nThis, together with possibly other configurations, cause the following\nIR to be generated:\n\n  define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #5 section \".init.text\" align 16 !kcfi_type !29 {\n    %1 = alloca [64 x i8], align 16\n    ...\n\n  14:                                               ; preds = %11\n    %15 = getelementptr inbounds i8, ptr %1, i64 63\n    %16 = load i8, ptr %15, align 1\n    %17 = tail call i1 @llvm.is.constant.i8(i8 %16)\n    %18 = icmp eq i8 %16, 0\n    %19 = select i1 %17, i1 %18, i1 false\n    br i1 %19, label %20, label %23\n\n  20:                                               ; preds = %14\n    %21 = call i64 @strlen(ptr noundef nonnull dereferenceable(1) %1) #23\n    ...\n\n  23:                                               ; preds = %14, %11, %20\n    %24 = call i64 @strnlen(ptr noundef nonnull dereferenceable(1) %1, i64 noundef 64) #24\n    ...\n  }\n\nThe above code calculates the address of the last char in the buffer\n(value %15) and then loads from it (value %16). Because the buffer is\nnever initialized, the LLVM GVN pass marks value %16 as undefined:\n\n  %13 = getelementptr inbounds i8, ptr %1, i64 63\n  br i1 undef, label %14, label %17\n\nThis gives later passes (SCCP, in particular) more DCE opportunities by\npropagating the undef value further, and eventually removes everything\nafter the load on the uninitialized stack location:\n\n  define hidden i32 @ip_vs_protocol_init() local_unnamed_addr #0 section \".init.text\" align 16 !kcfi_type !11 {\n    %1 = alloca [64 x i8], align 16\n    ...\n\n  12:                                               ; preds = %11\n    %13 = getelementptr inbounds i8, ptr %1, i64 63\n    unreachable\n  }\n\nIn this way, the generated native code will just fall through to the\nnext function, as LLVM does not generate any code for the unreachable IR\ninstruction and leaves the function without a terminator.\n\nZero the on-stack buffer to avoid this possible UB.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-53680",
          "url": "https://www.suse.com/security/cve/CVE-2024-53680"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235715 for CVE-2024-53680",
          "url": "https://bugzilla.suse.com/1235715"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.8,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-53680"
    },
    {
      "cve": "CVE-2024-56633",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56633"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntcp_bpf: Fix the sk_mem_uncharge logic in tcp_bpf_sendmsg\n\nThe current sk memory accounting logic in __SK_REDIRECT is pre-uncharging\ntosend bytes, which is either msg-\u003esg.size or a smaller value apply_bytes.\n\nPotential problems with this strategy are as follows:\n\n- If the actual sent bytes are smaller than tosend, we need to charge some\n  bytes back, as in line 487, which is okay but seems not clean.\n\n- When tosend is set to apply_bytes, as in line 417, and (ret \u003c 0), we may\n  miss uncharging (msg-\u003esg.size - apply_bytes) bytes.\n\n[...]\n415 tosend = msg-\u003esg.size;\n416 if (psock-\u003eapply_bytes \u0026\u0026 psock-\u003eapply_bytes \u003c tosend)\n417   tosend = psock-\u003eapply_bytes;\n[...]\n443 sk_msg_return(sk, msg, tosend);\n444 release_sock(sk);\n446 origsize = msg-\u003esg.size;\n447 ret = tcp_bpf_sendmsg_redir(sk_redir, redir_ingress,\n448                             msg, tosend, flags);\n449 sent = origsize - msg-\u003esg.size;\n[...]\n454 lock_sock(sk);\n455 if (unlikely(ret \u003c 0)) {\n456   int free = sk_msg_free_nocharge(sk, msg);\n458   if (!cork)\n459     *copied -= free;\n460 }\n[...]\n487 if (eval == __SK_REDIRECT)\n488   sk_mem_charge(sk, tosend - sent);\n[...]\n\nWhen running the selftest test_txmsg_redir_wait_sndmem with txmsg_apply,\nthe following warning will be reported:\n\n------------[ cut here ]------------\nWARNING: CPU: 6 PID: 57 at net/ipv4/af_inet.c:156 inet_sock_destruct+0x190/0x1a0\nModules linked in:\nCPU: 6 UID: 0 PID: 57 Comm: kworker/6:0 Not tainted 6.12.0-rc1.bm.1-amd64+ #43\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014\nWorkqueue: events sk_psock_destroy\nRIP: 0010:inet_sock_destruct+0x190/0x1a0\nRSP: 0018:ffffad0a8021fe08 EFLAGS: 00010206\nRAX: 0000000000000011 RBX: ffff9aab4475b900 RCX: ffff9aab481a0800\nRDX: 0000000000000303 RSI: 0000000000000011 RDI: ffff9aab4475b900\nRBP: ffff9aab4475b990 R08: 0000000000000000 R09: ffff9aab40050ec0\nR10: 0000000000000000 R11: ffff9aae6fdb1d01 R12: ffff9aab49c60400\nR13: ffff9aab49c60598 R14: ffff9aab49c60598 R15: dead000000000100\nFS:  0000000000000000(0000) GS:ffff9aae6fd80000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007ffec7e47bd8 CR3: 00000001a1a1c004 CR4: 0000000000770ef0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nPKRU: 55555554\nCall Trace:\n\u003cTASK\u003e\n? __warn+0x89/0x130\n? inet_sock_destruct+0x190/0x1a0\n? report_bug+0xfc/0x1e0\n? handle_bug+0x5c/0xa0\n? exc_invalid_op+0x17/0x70\n? asm_exc_invalid_op+0x1a/0x20\n? inet_sock_destruct+0x190/0x1a0\n__sk_destruct+0x25/0x220\nsk_psock_destroy+0x2b2/0x310\nprocess_scheduled_works+0xa3/0x3e0\nworker_thread+0x117/0x240\n? __pfx_worker_thread+0x10/0x10\nkthread+0xcf/0x100\n? __pfx_kthread+0x10/0x10\nret_from_fork+0x31/0x40\n? __pfx_kthread+0x10/0x10\nret_from_fork_asm+0x1a/0x30\n\u003c/TASK\u003e\n---[ end trace 0000000000000000 ]---\n\nIn __SK_REDIRECT, a more concise way is delaying the uncharging after sent\nbytes are finalized, and uncharge this value. When (ret \u003c 0), we shall\ninvoke sk_msg_free.\n\nSame thing happens in case __SK_DROP, when tosend is set to apply_bytes,\nwe may miss uncharging (msg-\u003esg.size - apply_bytes) bytes. The same\nwarning will be reported in selftest.\n\n[...]\n468 case __SK_DROP:\n469 default:\n470 sk_msg_free_partial(sk, msg, tosend);\n471 sk_msg_apply_bytes(psock, tosend);\n472 *copied -= (tosend + delta);\n473 return -EACCES;\n[...]\n\nSo instead of sk_msg_free_partial we can do sk_msg_free here.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56633",
          "url": "https://www.suse.com/security/cve/CVE-2024-56633"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235485 for CVE-2024-56633",
          "url": "https://bugzilla.suse.com/1235485"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56633"
    },
    {
      "cve": "CVE-2024-56640",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56640"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/smc: fix LGR and link use-after-free issue\n\nWe encountered a LGR/link use-after-free issue, which manifested as\nthe LGR/link refcnt reaching 0 early and entering the clear process,\nmaking resource access unsafe.\n\n refcount_t: addition on 0; use-after-free.\n WARNING: CPU: 14 PID: 107447 at lib/refcount.c:25 refcount_warn_saturate+0x9c/0x140\n Workqueue: events smc_lgr_terminate_work [smc]\n Call trace:\n  refcount_warn_saturate+0x9c/0x140\n  __smc_lgr_terminate.part.45+0x2a8/0x370 [smc]\n  smc_lgr_terminate_work+0x28/0x30 [smc]\n  process_one_work+0x1b8/0x420\n  worker_thread+0x158/0x510\n  kthread+0x114/0x118\n\nor\n\n refcount_t: underflow; use-after-free.\n WARNING: CPU: 6 PID: 93140 at lib/refcount.c:28 refcount_warn_saturate+0xf0/0x140\n Workqueue: smc_hs_wq smc_listen_work [smc]\n Call trace:\n  refcount_warn_saturate+0xf0/0x140\n  smcr_link_put+0x1cc/0x1d8 [smc]\n  smc_conn_free+0x110/0x1b0 [smc]\n  smc_conn_abort+0x50/0x60 [smc]\n  smc_listen_find_device+0x75c/0x790 [smc]\n  smc_listen_work+0x368/0x8a0 [smc]\n  process_one_work+0x1b8/0x420\n  worker_thread+0x158/0x510\n  kthread+0x114/0x118\n\nIt is caused by repeated release of LGR/link refcnt. One suspect is that\nsmc_conn_free() is called repeatedly because some smc_conn_free() from\nserver listening path are not protected by sock lock.\n\ne.g.\n\nCalls under socklock        | smc_listen_work\n-------------------------------------------------------\nlock_sock(sk)               | smc_conn_abort\nsmc_conn_free               | \\- smc_conn_free\n\\- smcr_link_put            |    \\- smcr_link_put (duplicated)\nrelease_sock(sk)\n\nSo here add sock lock protection in smc_listen_work() path, making it\nexclusive with other connection operations.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56640",
          "url": "https://www.suse.com/security/cve/CVE-2024-56640"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235436 for CVE-2024-56640",
          "url": "https://bugzilla.suse.com/1235436"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56640"
    },
    {
      "cve": "CVE-2024-56770",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-56770"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet/sched: netem: account for backlog updates from child qdisc\n\nIn general, \u0027qlen\u0027 of any classful qdisc should keep track of the\nnumber of packets that the qdisc itself and all of its children holds.\nIn case of netem, \u0027qlen\u0027 only accounts for the packets in its internal\ntfifo. When netem is used with a child qdisc, the child qdisc can use\n\u0027qdisc_tree_reduce_backlog\u0027 to inform its parent, netem, about created\nor dropped SKBs. This function updates \u0027qlen\u0027 and the backlog statistics\nof netem, but netem does not account for changes made by a child qdisc.\n\u0027qlen\u0027 then indicates the wrong number of packets in the tfifo.\nIf a child qdisc creates new SKBs during enqueue and informs its parent\nabout this, netem\u0027s \u0027qlen\u0027 value is increased. When netem dequeues the\nnewly created SKBs from the child, the \u0027qlen\u0027 in netem is not updated.\nIf \u0027qlen\u0027 reaches the configured sch-\u003elimit, the enqueue function stops\nworking, even though the tfifo is not full.\n\nReproduce the bug:\nEnsure that the sender machine has GSO enabled. Configure netem as root\nqdisc and tbf as its child on the outgoing interface of the machine\nas follows:\n$ tc qdisc add dev \u003coif\u003e root handle 1: netem delay 100ms limit 100\n$ tc qdisc add dev \u003coif\u003e parent 1:0 tbf rate 50Mbit burst 1542 latency 50ms\n\nSend bulk TCP traffic out via this interface, e.g., by running an iPerf3\nclient on the machine. Check the qdisc statistics:\n$ tc -s qdisc show dev \u003coif\u003e\n\nStatistics after 10s of iPerf3 TCP test before the fix (note that\nnetem\u0027s backlog \u003e limit, netem stopped accepting packets):\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 2767766 bytes 1848 pkt (dropped 652, overlimits 0 requeues 0)\n backlog 4294528236b 1155p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 2767766 bytes 1848 pkt (dropped 327, overlimits 7601 requeues 0)\n backlog 0b 0p requeues 0\n\nStatistics after the fix:\nqdisc netem 1: root refcnt 2 limit 1000 delay 100ms\n Sent 37766372 bytes 24974 pkt (dropped 9, overlimits 0 requeues 0)\n backlog 0b 0p requeues 0\nqdisc tbf 10: parent 1:1 rate 50Mbit burst 1537b lat 50ms\n Sent 37766372 bytes 24974 pkt (dropped 327, overlimits 96017 requeues 0)\n backlog 0b 0p requeues 0\n\ntbf segments the GSO SKBs (tbf_segment) and updates the netem\u0027s \u0027qlen\u0027.\nThe interface fully stops transferring packets and \"locks\". In this case,\nthe child qdisc and tfifo are empty, but \u0027qlen\u0027 indicates the tfifo is at\nits limit and no more packets are accepted.\n\nThis patch adds a counter for the entries in the tfifo. Netem\u0027s \u0027qlen\u0027 is\nonly decreased when a packet is returned by its dequeue function, and not\nduring enqueuing into the child qdisc. External updates to \u0027qlen\u0027 are thus\naccounted for and only the behavior of the backlog statistics changes. As\nin other qdiscs, \u0027qlen\u0027 then keeps track of  how many packets are held in\nnetem and all of its children. As before, sch-\u003elimit remains as the\nmaximum number of packets in the tfifo. The same applies to netem\u0027s\nbacklog statistics.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-56770",
          "url": "https://www.suse.com/security/cve/CVE-2024-56770"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235637 for CVE-2024-56770",
          "url": "https://bugzilla.suse.com/1235637"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-56770"
    },
    {
      "cve": "CVE-2024-57900",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57900"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nila: serialize calls to nf_register_net_hooks()\n\nsyzbot found a race in ila_add_mapping() [1]\n\ncommit 031ae72825ce (\"ila: call nf_unregister_net_hooks() sooner\")\nattempted to fix a similar issue.\n\nLooking at the syzbot repro, we have concurrent ILA_CMD_ADD commands.\n\nAdd a mutex to make sure at most one thread is calling nf_register_net_hooks().\n\n[1]\n BUG: KASAN: slab-use-after-free in rht_key_hashfn include/linux/rhashtable.h:159 [inline]\n BUG: KASAN: slab-use-after-free in __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604\nRead of size 4 at addr ffff888028f40008 by task dhcpcd/5501\n\nCPU: 1 UID: 0 PID: 5501 Comm: dhcpcd Not tainted 6.13.0-rc4-syzkaller-00054-gd6ef8b40d075 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n \u003cIRQ\u003e\n  __dump_stack lib/dump_stack.c:94 [inline]\n  dump_stack_lvl+0x116/0x1f0 lib/dump_stack.c:120\n  print_address_description mm/kasan/report.c:378 [inline]\n  print_report+0xc3/0x620 mm/kasan/report.c:489\n  kasan_report+0xd9/0x110 mm/kasan/report.c:602\n  rht_key_hashfn include/linux/rhashtable.h:159 [inline]\n  __rhashtable_lookup.constprop.0+0x426/0x550 include/linux/rhashtable.h:604\n  rhashtable_lookup include/linux/rhashtable.h:646 [inline]\n  rhashtable_lookup_fast include/linux/rhashtable.h:672 [inline]\n  ila_lookup_wildcards net/ipv6/ila/ila_xlat.c:127 [inline]\n  ila_xlat_addr net/ipv6/ila/ila_xlat.c:652 [inline]\n  ila_nf_input+0x1ee/0x620 net/ipv6/ila/ila_xlat.c:185\n  nf_hook_entry_hookfn include/linux/netfilter.h:154 [inline]\n  nf_hook_slow+0xbb/0x200 net/netfilter/core.c:626\n  nf_hook.constprop.0+0x42e/0x750 include/linux/netfilter.h:269\n  NF_HOOK include/linux/netfilter.h:312 [inline]\n  ipv6_rcv+0xa4/0x680 net/ipv6/ip6_input.c:309\n  __netif_receive_skb_one_core+0x12e/0x1e0 net/core/dev.c:5672\n  __netif_receive_skb+0x1d/0x160 net/core/dev.c:5785\n  process_backlog+0x443/0x15f0 net/core/dev.c:6117\n  __napi_poll.constprop.0+0xb7/0x550 net/core/dev.c:6883\n  napi_poll net/core/dev.c:6952 [inline]\n  net_rx_action+0xa94/0x1010 net/core/dev.c:7074\n  handle_softirqs+0x213/0x8f0 kernel/softirq.c:561\n  __do_softirq kernel/softirq.c:595 [inline]\n  invoke_softirq kernel/softirq.c:435 [inline]\n  __irq_exit_rcu+0x109/0x170 kernel/softirq.c:662\n  irq_exit_rcu+0x9/0x30 kernel/softirq.c:678\n  instr_sysvec_apic_timer_interrupt arch/x86/kernel/apic/apic.c:1049 [inline]\n  sysvec_apic_timer_interrupt+0xa4/0xc0 arch/x86/kernel/apic/apic.c:1049",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57900",
          "url": "https://www.suse.com/security/cve/CVE-2024-57900"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1235973 for CVE-2024-57900",
          "url": "https://bugzilla.suse.com/1235973"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-57900"
    },
    {
      "cve": "CVE-2024-57973",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57973"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrdma/cxgb4: Prevent potential integer overflow on 32bit\n\nThe \"gl-\u003etot_len\" variable is controlled by the user.  It comes from\nprocess_responses().  On 32bit systems, the \"gl-\u003etot_len + sizeof(struct\ncpl_pass_accept_req) + sizeof(struct rss_header)\" addition could have an\ninteger wrapping bug.  Use size_add() to prevent this.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57973",
          "url": "https://www.suse.com/security/cve/CVE-2024-57973"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238531 for CVE-2024-57973",
          "url": "https://bugzilla.suse.com/1238531"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-57973"
    },
    {
      "cve": "CVE-2024-57979",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57979"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\npps: Fix a use-after-free\n\nOn a board running ntpd and gpsd, I\u0027m seeing a consistent use-after-free\nin sys_exit() from gpsd when rebooting:\n\n    pps pps1: removed\n    ------------[ cut here ]------------\n    kobject: \u0027(null)\u0027 (00000000db4bec24): is not initialized, yet kobject_put() is being called.\n    WARNING: CPU: 2 PID: 440 at lib/kobject.c:734 kobject_put+0x120/0x150\n    CPU: 2 UID: 299 PID: 440 Comm: gpsd Not tainted 6.11.0-rc6-00308-gb31c44928842 #1\n    Hardware name: Raspberry Pi 4 Model B Rev 1.1 (DT)\n    pstate: 60000005 (nZCv daif -PAN -UAO -TCO -DIT -SSBS BTYPE=--)\n    pc : kobject_put+0x120/0x150\n    lr : kobject_put+0x120/0x150\n    sp : ffffffc0803d3ae0\n    x29: ffffffc0803d3ae0 x28: ffffff8042dc9738 x27: 0000000000000001\n    x26: 0000000000000000 x25: ffffff8042dc9040 x24: ffffff8042dc9440\n    x23: ffffff80402a4620 x22: ffffff8042ef4bd0 x21: ffffff80405cb600\n    x20: 000000000008001b x19: ffffff8040b3b6e0 x18: 0000000000000000\n    x17: 0000000000000000 x16: 0000000000000000 x15: 696e6920746f6e20\n    x14: 7369203a29343263 x13: 205d303434542020 x12: 0000000000000000\n    x11: 0000000000000000 x10: 0000000000000000 x9 : 0000000000000000\n    x8 : 0000000000000000 x7 : 0000000000000000 x6 : 0000000000000000\n    x5 : 0000000000000000 x4 : 0000000000000000 x3 : 0000000000000000\n    x2 : 0000000000000000 x1 : 0000000000000000 x0 : 0000000000000000\n    Call trace:\n     kobject_put+0x120/0x150\n     cdev_put+0x20/0x3c\n     __fput+0x2c4/0x2d8\n     ____fput+0x1c/0x38\n     task_work_run+0x70/0xfc\n     do_exit+0x2a0/0x924\n     do_group_exit+0x34/0x90\n     get_signal+0x7fc/0x8c0\n     do_signal+0x128/0x13b4\n     do_notify_resume+0xdc/0x160\n     el0_svc+0xd4/0xf8\n     el0t_64_sync_handler+0x140/0x14c\n     el0t_64_sync+0x190/0x194\n    ---[ end trace 0000000000000000 ]---\n\n...followed by more symptoms of corruption, with similar stacks:\n\n    refcount_t: underflow; use-after-free.\n    kernel BUG at lib/list_debug.c:62!\n    Kernel panic - not syncing: Oops - BUG: Fatal exception\n\nThis happens because pps_device_destruct() frees the pps_device with the\nembedded cdev immediately after calling cdev_del(), but, as the comment\nabove cdev_del() notes, fops for previously opened cdevs are still\ncallable even after cdev_del() returns. I think this bug has always\nbeen there: I can\u0027t explain why it suddenly started happening every time\nI reboot this particular board.\n\nIn commit d953e0e837e6 (\"pps: Fix a use-after free bug when\nunregistering a source.\"), George Spelvin suggested removing the\nembedded cdev. That seems like the simplest way to fix this, so I\u0027ve\nimplemented his suggestion, using __register_chrdev() with pps_idr\nbecoming the source of truth for which minor corresponds to which\ndevice.\n\nBut now that pps_idr defines userspace visibility instead of cdev_add(),\nwe need to be sure the pps-\u003edev refcount can\u0027t reach zero while\nuserspace can still find it again. So, the idr_remove() call moves to\npps_unregister_cdev(), and pps_idr now holds a reference to pps-\u003edev.\n\n    pps_core: source serial1 got cdev (251:1)\n    \u003c...\u003e\n    pps pps1: removed\n    pps_core: unregistering pps1\n    pps_core: deallocating pps1",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57979",
          "url": "https://www.suse.com/security/cve/CVE-2024-57979"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238521 for CVE-2024-57979",
          "url": "https://bugzilla.suse.com/1238521"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-57979"
    },
    {
      "cve": "CVE-2024-57996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-57996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet_sched: sch_sfq: don\u0027t allow 1 packet limit\n\nThe current implementation does not work correctly with a limit of\n1. iproute2 actually checks for this and this patch adds the check in\nkernel as well.\n\nThis fixes the following syzkaller reported crash:\n\nUBSAN: array-index-out-of-bounds in net/sched/sch_sfq.c:210:6\nindex 65535 is out of range for type \u0027struct sfq_head[128]\u0027\nCPU: 0 PID: 2569 Comm: syz-executor101 Not tainted 5.10.0-smp-DEV #1\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nCall Trace:\n  __dump_stack lib/dump_stack.c:79 [inline]\n  dump_stack+0x125/0x19f lib/dump_stack.c:120\n  ubsan_epilogue lib/ubsan.c:148 [inline]\n  __ubsan_handle_out_of_bounds+0xed/0x120 lib/ubsan.c:347\n  sfq_link net/sched/sch_sfq.c:210 [inline]\n  sfq_dec+0x528/0x600 net/sched/sch_sfq.c:238\n  sfq_dequeue+0x39b/0x9d0 net/sched/sch_sfq.c:500\n  sfq_reset+0x13/0x50 net/sched/sch_sfq.c:525\n  qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n  tbf_reset+0x3d/0x100 net/sched/sch_tbf.c:319\n  qdisc_reset+0xfe/0x510 net/sched/sch_generic.c:1026\n  dev_reset_queue+0x8c/0x140 net/sched/sch_generic.c:1296\n  netdev_for_each_tx_queue include/linux/netdevice.h:2350 [inline]\n  dev_deactivate_many+0x6dc/0xc20 net/sched/sch_generic.c:1362\n  __dev_close_many+0x214/0x350 net/core/dev.c:1468\n  dev_close_many+0x207/0x510 net/core/dev.c:1506\n  unregister_netdevice_many+0x40f/0x16b0 net/core/dev.c:10738\n  unregister_netdevice_queue+0x2be/0x310 net/core/dev.c:10695\n  unregister_netdevice include/linux/netdevice.h:2893 [inline]\n  __tun_detach+0x6b6/0x1600 drivers/net/tun.c:689\n  tun_detach drivers/net/tun.c:705 [inline]\n  tun_chr_close+0x104/0x1b0 drivers/net/tun.c:3640\n  __fput+0x203/0x840 fs/file_table.c:280\n  task_work_run+0x129/0x1b0 kernel/task_work.c:185\n  exit_task_work include/linux/task_work.h:33 [inline]\n  do_exit+0x5ce/0x2200 kernel/exit.c:931\n  do_group_exit+0x144/0x310 kernel/exit.c:1046\n  __do_sys_exit_group kernel/exit.c:1057 [inline]\n  __se_sys_exit_group kernel/exit.c:1055 [inline]\n  __x64_sys_exit_group+0x3b/0x40 kernel/exit.c:1055\n do_syscall_64+0x6c/0xd0\n entry_SYSCALL_64_after_hwframe+0x61/0xcb\nRIP: 0033:0x7fe5e7b52479\nCode: Unable to access opcode bytes at RIP 0x7fe5e7b5244f.\nRSP: 002b:00007ffd3c800398 EFLAGS: 00000246 ORIG_RAX: 00000000000000e7\nRAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fe5e7b52479\nRDX: 000000000000003c RSI: 00000000000000e7 RDI: 0000000000000000\nRBP: 00007fe5e7bcd2d0 R08: ffffffffffffffb8 R09: 0000000000000014\nR10: 0000000000000000 R11: 0000000000000246 R12: 00007fe5e7bcd2d0\nR13: 0000000000000000 R14: 00007fe5e7bcdd20 R15: 00007fe5e7b24270\n\nThe crash can be also be reproduced with the following (with a tc\nrecompiled to allow for sfq limits of 1):\n\ntc qdisc add dev dummy0 handle 1: root tbf rate 1Kbit burst 100b lat 1s\n../iproute2-6.9.0/tc/tc qdisc add dev dummy0 handle 2: parent 1:10 sfq limit 1\nifconfig dummy0 up\nping -I dummy0 -f -c2 -W0.1 8.8.8.8\nsleep 1\n\nScenario that triggers the crash:\n\n* the first packet is sent and queued in TBF and SFQ; qdisc qlen is 1\n\n* TBF dequeues: it peeks from SFQ which moves the packet to the\n  gso_skb list and keeps qdisc qlen set to 1. TBF is out of tokens so\n  it schedules itself for later.\n\n* the second packet is sent and TBF tries to queues it to SFQ. qdisc\n  qlen is now 2 and because the SFQ limit is 1 the packet is dropped\n  by SFQ. At this point qlen is 1, and all of the SFQ slots are empty,\n  however q-\u003etail is not NULL.\n\nAt this point, assuming no more packets are queued, when sch_dequeue\nruns again it will decrement the qlen for the current empty slot\ncausing an underflow and the subsequent out of bounds access.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-57996",
          "url": "https://www.suse.com/security/cve/CVE-2024-57996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239076 for CVE-2024-57996",
          "url": "https://bugzilla.suse.com/1239076"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239077 for CVE-2024-57996",
          "url": "https://bugzilla.suse.com/1239077"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-57996"
    },
    {
      "cve": "CVE-2024-58014",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-58014"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmsmac: add gain range check to wlc_phy_iqcal_gainparams_nphy()\n\nIn \u0027wlc_phy_iqcal_gainparams_nphy()\u0027, add gain range check to WARN()\ninstead of possible out-of-bounds \u0027tbl_iqcal_gainparams_nphy\u0027 access.\nCompile tested only.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-58014",
          "url": "https://www.suse.com/security/cve/CVE-2024-58014"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239109 for CVE-2024-58014",
          "url": "https://bugzilla.suse.com/1239109"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239110 for CVE-2024-58014",
          "url": "https://bugzilla.suse.com/1239110"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2024-58014"
    },
    {
      "cve": "CVE-2024-58052",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-58052"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/amdgpu: Fix potential NULL pointer dereference in atomctrl_get_smc_sclk_range_table\n\nThe function atomctrl_get_smc_sclk_range_table() does not check the return\nvalue of smu_atom_get_data_table(). If smu_atom_get_data_table() fails to\nretrieve SMU_Info table, it returns NULL which is later dereferenced.\n\nFound by Linux Verification Center (linuxtesting.org) with SVACE.\n\nIn practice this should never happen as this code only gets called\non polaris chips and the vbios data table will always be present on\nthose chips.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-58052",
          "url": "https://www.suse.com/security/cve/CVE-2024-58052"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238986 for CVE-2024-58052",
          "url": "https://bugzilla.suse.com/1238986"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-58052"
    },
    {
      "cve": "CVE-2024-58071",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-58071"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nteam: prevent adding a device which is already a team device lower\n\nPrevent adding a device which is already a team device lower,\ne.g. adding veth0 if vlan1 was already added and veth0 is a lower of\nvlan1.\n\nThis is not useful in practice and can lead to recursive locking:\n\n$ ip link add veth0 type veth peer name veth1\n$ ip link set veth0 up\n$ ip link set veth1 up\n$ ip link add link veth0 name veth0.1 type vlan protocol 802.1Q id 1\n$ ip link add team0 type team\n$ ip link set veth0.1 down\n$ ip link set veth0.1 master team0\nteam0: Port device veth0.1 added\n$ ip link set veth0 down\n$ ip link set veth0 master team0\n\n============================================\nWARNING: possible recursive locking detected\n6.13.0-rc2-virtme-00441-ga14a429069bb #46 Not tainted\n--------------------------------------------\nip/7684 is trying to acquire lock:\nffff888016848e00 (team-\u003eteam_lock_key){+.+.}-{4:4}, at: team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n\nbut task is already holding lock:\nffff888016848e00 (team-\u003eteam_lock_key){+.+.}-{4:4}, at: team_add_slave (drivers/net/team/team_core.c:1147 drivers/net/team/team_core.c:1977)\n\nother info that might help us debug this:\nPossible unsafe locking scenario:\n\nCPU0\n----\nlock(team-\u003eteam_lock_key);\nlock(team-\u003eteam_lock_key);\n\n*** DEADLOCK ***\n\nMay be due to missing lock nesting notation\n\n2 locks held by ip/7684:\n\nstack backtrace:\nCPU: 3 UID: 0 PID: 7684 Comm: ip Not tainted 6.13.0-rc2-virtme-00441-ga14a429069bb #46\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.16.3-debian-1.16.3-2 04/01/2014\nCall Trace:\n\u003cTASK\u003e\ndump_stack_lvl (lib/dump_stack.c:122)\nprint_deadlock_bug.cold (kernel/locking/lockdep.c:3040)\n__lock_acquire (kernel/locking/lockdep.c:3893 kernel/locking/lockdep.c:5226)\n? netlink_broadcast_filtered (net/netlink/af_netlink.c:1548)\nlock_acquire.part.0 (kernel/locking/lockdep.c:467 kernel/locking/lockdep.c:5851)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? trace_lock_acquire (./include/trace/events/lock.h:24 (discriminator 2))\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? lock_acquire (kernel/locking/lockdep.c:5822)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n__mutex_lock (kernel/locking/mutex.c:587 kernel/locking/mutex.c:735)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\n? fib_sync_up (net/ipv4/fib_semantics.c:2167)\n? team_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nteam_device_event (drivers/net/team/team_core.c:2928 drivers/net/team/team_core.c:2951 drivers/net/team/team_core.c:2973)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\n__dev_notify_flags (net/core/dev.c:8993)\n? __dev_change_flags (net/core/dev.c:8975)\ndev_change_flags (net/core/dev.c:9027)\nvlan_device_event (net/8021q/vlan.c:85 net/8021q/vlan.c:470)\n? br_device_event (net/bridge/br.c:143)\nnotifier_call_chain (kernel/notifier.c:85)\ncall_netdevice_notifiers_info (net/core/dev.c:1996)\ndev_open (net/core/dev.c:1519 net/core/dev.c:1505)\nteam_add_slave (drivers/net/team/team_core.c:1219 drivers/net/team/team_core.c:1977)\n? __pfx_team_add_slave (drivers/net/team/team_core.c:1972)\ndo_set_master (net/core/rtnetlink.c:2917)\ndo_setlink.isra.0 (net/core/rtnetlink.c:3117)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-58071",
          "url": "https://www.suse.com/security/cve/CVE-2024-58071"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238970 for CVE-2024-58071",
          "url": "https://bugzilla.suse.com/1238970"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-58071"
    },
    {
      "cve": "CVE-2024-58072",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-58072"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: rtlwifi: remove unused check_buddy_priv\n\nCommit 2461c7d60f9f (\"rtlwifi: Update header file\") introduced a global\nlist of private data structures.\n\nLater on, commit 26634c4b1868 (\"rtlwifi Modify existing bits to match\nvendor version 2013.02.07\") started adding the private data to that list at\nprobe time and added a hook, check_buddy_priv to find the private data from\na similar device.\n\nHowever, that function was never used.\n\nBesides, though there is a lock for that list, it is never used. And when\nthe probe fails, the private data is never removed from the list. This\nwould cause a second probe to access freed memory.\n\nRemove the unused hook, structures and members, which will prevent the\npotential race condition on the list and its corruption during a second\nprobe when probe fails.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-58072",
          "url": "https://www.suse.com/security/cve/CVE-2024-58072"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238964 for CVE-2024-58072",
          "url": "https://bugzilla.suse.com/1238964"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-58072"
    },
    {
      "cve": "CVE-2024-58083",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2024-58083"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nKVM: Explicitly verify target vCPU is online in kvm_get_vcpu()\n\nExplicitly verify the target vCPU is fully online _prior_ to clamping the\nindex in kvm_get_vcpu().  If the index is \"bad\", the nospec clamping will\ngenerate \u00270\u0027, i.e. KVM will return vCPU0 instead of NULL.\n\nIn practice, the bug is unlikely to cause problems, as it will only come\ninto play if userspace or the guest is buggy or misbehaving, e.g. KVM may\nsend interrupts to vCPU0 instead of dropping them on the floor.\n\nHowever, returning vCPU0 when it shouldn\u0027t exist per online_vcpus is\nproblematic now that KVM uses an xarray for the vCPUs array, as KVM needs\nto insert into the xarray before publishing the vCPU to userspace (see\ncommit c5b077549136 (\"KVM: Convert the kvm-\u003evcpus array to a xarray\")),\ni.e. before vCPU creation is guaranteed to succeed.\n\nAs a result, incorrectly providing access to vCPU0 will trigger a\nuse-after-free if vCPU0 is dereferenced and kvm_vm_ioctl_create_vcpu()\nbails out of vCPU creation due to an error and frees vCPU0.  Commit\nafb2acb2e3a3 (\"KVM: Fix vcpu_array[0] races\") papered over that issue, but\nin doing so introduced an unsolvable teardown conundrum.  Preventing\naccesses to vCPU0 before it\u0027s fully online will allow reverting commit\nafb2acb2e3a3, without re-introducing the vcpu_array[0] UAF race.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2024-58083",
          "url": "https://www.suse.com/security/cve/CVE-2024-58083"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239036 for CVE-2024-58083",
          "url": "https://bugzilla.suse.com/1239036"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2024-58083"
    },
    {
      "cve": "CVE-2025-21703",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21703"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnetem: Update sch-\u003eq.qlen before qdisc_tree_reduce_backlog()\n\nqdisc_tree_reduce_backlog() notifies parent qdisc only if child\nqdisc becomes empty, therefore we need to reduce the backlog of the\nchild qdisc before calling it. Otherwise it would miss the opportunity\nto call cops-\u003eqlen_notify(), in the case of DRR, it resulted in UAF\nsince DRR uses -\u003eqlen_notify() to maintain its active list.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21703",
          "url": "https://www.suse.com/security/cve/CVE-2025-21703"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237313 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1237313"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1245796 for CVE-2025-21703",
          "url": "https://bugzilla.suse.com/1245796"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21703"
    },
    {
      "cve": "CVE-2025-21708",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21708"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: usb: rtl8150: enable basic endpoint checking\n\nSyzkaller reports [1] encountering a common issue of utilizing a wrong\nusb endpoint type during URB submitting stage. This, in turn, triggers\na warning shown below.\n\nFor now, enable simple endpoint checking (specifically, bulk and\ninterrupt eps, testing control one is not essential) to mitigate\nthe issue with a view to do other related cosmetic changes later,\nif they are necessary.\n\n[1] Syzkaller report:\nusb 1-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 1 PID: 2586 at drivers/usb/core/urb.c:503 usb_submit_urb+0xe4b/0x1730 driv\u003e\nModules linked in:\nCPU: 1 UID: 0 PID: 2586 Comm: dhcpcd Not tainted 6.11.0-rc4-syzkaller-00069-gfc88bb11617\u003e\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 08/06/2024\nRIP: 0010:usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503\nCode: 84 3c 02 00 00 e8 05 e4 fc fc 4c 89 ef e8 fd 25 d7 fe 45 89 e0 89 e9 4c 89 f2 48 8\u003e\nRSP: 0018:ffffc9000441f740 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: ffff888112487a00 RCX: ffffffff811a99a9\nRDX: ffff88810df6ba80 RSI: ffffffff811a99b6 RDI: 0000000000000001\nRBP: 0000000000000003 R08: 0000000000000001 R09: 0000000000000000\nR10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000001\nR13: ffff8881023bf0a8 R14: ffff888112452a20 R15: ffff888112487a7c\nFS:  00007fc04eea5740(0000) GS:ffff8881f6300000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 00007f0a1de9f870 CR3: 000000010dbd0000 CR4: 00000000003506f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n rtl8150_open+0x300/0xe30 drivers/net/usb/rtl8150.c:733\n __dev_open+0x2d4/0x4e0 net/core/dev.c:1474\n __dev_change_flags+0x561/0x720 net/core/dev.c:8838\n dev_change_flags+0x8f/0x160 net/core/dev.c:8910\n devinet_ioctl+0x127a/0x1f10 net/ipv4/devinet.c:1177\n inet_ioctl+0x3aa/0x3f0 net/ipv4/af_inet.c:1003\n sock_do_ioctl+0x116/0x280 net/socket.c:1222\n sock_ioctl+0x22e/0x6c0 net/socket.c:1341\n vfs_ioctl fs/ioctl.c:51 [inline]\n __do_sys_ioctl fs/ioctl.c:907 [inline]\n __se_sys_ioctl fs/ioctl.c:893 [inline]\n __x64_sys_ioctl+0x193/0x220 fs/ioctl.c:893\n do_syscall_x64 arch/x86/entry/common.c:52 [inline]\n do_syscall_64+0xcd/0x250 arch/x86/entry/common.c:83\n entry_SYSCALL_64_after_hwframe+0x77/0x7f\nRIP: 0033:0x7fc04ef73d49\n...\n\nThis change has not been tested on real hardware.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21708",
          "url": "https://www.suse.com/security/cve/CVE-2025-21708"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239087 for CVE-2025-21708",
          "url": "https://bugzilla.suse.com/1239087"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21708"
    },
    {
      "cve": "CVE-2025-21744",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21744"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcmfmac: fix NULL pointer dereference in brcmf_txfinalize()\n\nOn removal of the device or unloading of the kernel module a potential NULL\npointer dereference occurs.\n\nThe following sequence deletes the interface:\n\n  brcmf_detach()\n    brcmf_remove_interface()\n      brcmf_del_if()\n\nInside the brcmf_del_if() function the drvr-\u003eif2bss[ifidx] is updated to\nBRCMF_BSSIDX_INVALID (-1) if the bsscfgidx matches.\n\nAfter brcmf_remove_interface() call the brcmf_proto_detach() function is\ncalled providing the following sequence:\n\n  brcmf_detach()\n    brcmf_proto_detach()\n      brcmf_proto_msgbuf_detach()\n        brcmf_flowring_detach()\n          brcmf_msgbuf_delete_flowring()\n            brcmf_msgbuf_remove_flowring()\n              brcmf_flowring_delete()\n                brcmf_get_ifp()\n                brcmf_txfinalize()\n\nSince brcmf_get_ip() can and actually will return NULL in this case the\ncall to brcmf_txfinalize() will result in a NULL pointer dereference inside\nbrcmf_txfinalize() when trying to update ifp-\u003endev-\u003estats.tx_errors.\n\nThis will only happen if a flowring still has an skb.\n\nAlthough the NULL pointer dereference has only been seen when trying to\nupdate the tx statistic, all other uses of the ifp pointer have been\nguarded as well with an early return if ifp is NULL.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21744",
          "url": "https://www.suse.com/security/cve/CVE-2025-21744"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238903 for CVE-2025-21744",
          "url": "https://bugzilla.suse.com/1238903"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21744"
    },
    {
      "cve": "CVE-2025-21759",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21759"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: mcast: extend RCU protection in igmp6_send()\n\nigmp6_send() can be called without RTNL or RCU being held.\n\nExtend RCU protection so that we can safely fetch the net pointer\nand avoid a potential UAF.\n\nNote that we no longer can use sock_alloc_send_skb() because\nipv6.igmp_sk uses GFP_KERNEL allocations which can sleep.\n\nInstead use alloc_skb() and charge the net-\u003eipv6.igmp_sk\nsocket under RCU protection.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21759",
          "url": "https://www.suse.com/security/cve/CVE-2025-21759"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238738 for CVE-2025-21759",
          "url": "https://bugzilla.suse.com/1238738"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21759"
    },
    {
      "cve": "CVE-2025-21760",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21760"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nndisc: extend RCU protection in ndisc_send_skb()\n\nndisc_send_skb() can be called without RTNL or RCU held.\n\nAcquire rcu_read_lock() earlier, so that we can use dev_net_rcu()\nand avoid a potential UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21760",
          "url": "https://www.suse.com/security/cve/CVE-2025-21760"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238763 for CVE-2025-21760",
          "url": "https://bugzilla.suse.com/1238763"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21760"
    },
    {
      "cve": "CVE-2025-21762",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21762"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narp: use RCU protection in arp_xmit()\n\narp_xmit() can be called without RTNL or RCU protection.\n\nUse RCU protection to avoid potential UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21762",
          "url": "https://www.suse.com/security/cve/CVE-2025-21762"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238780 for CVE-2025-21762",
          "url": "https://bugzilla.suse.com/1238780"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21762"
    },
    {
      "cve": "CVE-2025-21763",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21763"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nneighbour: use RCU protection in __neigh_notify()\n\n__neigh_notify() can be called without RTNL or RCU protection.\n\nUse RCU protection to avoid potential UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21763",
          "url": "https://www.suse.com/security/cve/CVE-2025-21763"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237897 for CVE-2025-21763",
          "url": "https://bugzilla.suse.com/1237897"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21763"
    },
    {
      "cve": "CVE-2025-21765",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21765"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv6: use RCU protection in ip6_default_advmss()\n\nip6_default_advmss() needs rcu protection to make\nsure the net structure it reads does not disappear.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21765",
          "url": "https://www.suse.com/security/cve/CVE-2025-21765"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1237906 for CVE-2025-21765",
          "url": "https://bugzilla.suse.com/1237906"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21765"
    },
    {
      "cve": "CVE-2025-21766",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21766"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipv4: use RCU protection in __ip_rt_update_pmtu()\n\n__ip_rt_update_pmtu() must use RCU protection to make\nsure the net structure it reads does not disappear.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21766",
          "url": "https://www.suse.com/security/cve/CVE-2025-21766"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238754 for CVE-2025-21766",
          "url": "https://bugzilla.suse.com/1238754"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21766"
    },
    {
      "cve": "CVE-2025-21776",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21776"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nUSB: hub: Ignore non-compliant devices with too many configs or interfaces\n\nRobert Morris created a test program which can cause\nusb_hub_to_struct_hub() to dereference a NULL or inappropriate\npointer:\n\nOops: general protection fault, probably for non-canonical address\n0xcccccccccccccccc: 0000 [#1] SMP DEBUG_PAGEALLOC PTI\nCPU: 7 UID: 0 PID: 117 Comm: kworker/7:1 Not tainted 6.13.0-rc3-00017-gf44d154d6e3d #14\nHardware name: FreeBSD BHYVE/BHYVE, BIOS 14.0 10/17/2021\nWorkqueue: usb_hub_wq hub_event\nRIP: 0010:usb_hub_adjust_deviceremovable+0x78/0x110\n...\nCall Trace:\n \u003cTASK\u003e\n ? die_addr+0x31/0x80\n ? exc_general_protection+0x1b4/0x3c0\n ? asm_exc_general_protection+0x26/0x30\n ? usb_hub_adjust_deviceremovable+0x78/0x110\n hub_probe+0x7c7/0xab0\n usb_probe_interface+0x14b/0x350\n really_probe+0xd0/0x2d0\n ? __pfx___device_attach_driver+0x10/0x10\n __driver_probe_device+0x6e/0x110\n driver_probe_device+0x1a/0x90\n __device_attach_driver+0x7e/0xc0\n bus_for_each_drv+0x7f/0xd0\n __device_attach+0xaa/0x1a0\n bus_probe_device+0x8b/0xa0\n device_add+0x62e/0x810\n usb_set_configuration+0x65d/0x990\n usb_generic_driver_probe+0x4b/0x70\n usb_probe_device+0x36/0xd0\n\nThe cause of this error is that the device has two interfaces, and the\nhub driver binds to interface 1 instead of interface 0, which is where\nusb_hub_to_struct_hub() looks.\n\nWe can prevent the problem from occurring by refusing to accept hub\ndevices that violate the USB spec by having more than one\nconfiguration or interface.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21776",
          "url": "https://www.suse.com/security/cve/CVE-2025-21776"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238909 for CVE-2025-21776",
          "url": "https://bugzilla.suse.com/1238909"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21776"
    },
    {
      "cve": "CVE-2025-21782",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21782"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\norangefs: fix a oob in orangefs_debug_write\n\nI got a syzbot report: slab-out-of-bounds Read in\norangefs_debug_write... several people suggested fixes,\nI tested Al Viro\u0027s suggestion and made this patch.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21782",
          "url": "https://www.suse.com/security/cve/CVE-2025-21782"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239117 for CVE-2025-21782",
          "url": "https://bugzilla.suse.com/1239117"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21782"
    },
    {
      "cve": "CVE-2025-21785",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21785"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\narm64: cacheinfo: Avoid out-of-bounds write to cacheinfo array\n\nThe loop that detects/populates cache information already has a bounds\ncheck on the array size but does not account for cache levels with\nseparate data/instructions cache. Fix this by incrementing the index\nfor any populated leaf (instead of any populated level).",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21785",
          "url": "https://www.suse.com/security/cve/CVE-2025-21785"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238747 for CVE-2025-21785",
          "url": "https://bugzilla.suse.com/1238747"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240745 for CVE-2025-21785",
          "url": "https://bugzilla.suse.com/1240745"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21785"
    },
    {
      "cve": "CVE-2025-21791",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21791"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nvrf: use RCU protection in l3mdev_l3_out()\n\nl3mdev_l3_out() can be called without RCU being held:\n\nraw_sendmsg()\n ip_push_pending_frames()\n  ip_send_skb()\n   ip_local_out()\n    __ip_local_out()\n     l3mdev_ip_out()\n\nAdd rcu_read_lock() / rcu_read_unlock() pair to avoid\na potential UAF.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21791",
          "url": "https://www.suse.com/security/cve/CVE-2025-21791"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238512 for CVE-2025-21791",
          "url": "https://bugzilla.suse.com/1238512"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240744 for CVE-2025-21791",
          "url": "https://bugzilla.suse.com/1240744"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.8,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-21791"
    },
    {
      "cve": "CVE-2025-21796",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21796"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfsd: clear acl_access/acl_default after releasing them\n\nIf getting acl_default fails, acl_access and acl_default will be released\nsimultaneously. However, acl_access will still retain a pointer pointing\nto the released posix_acl, which will trigger a WARNING in\nnfs3svc_release_getacl like this:\n\n------------[ cut here ]------------\nrefcount_t: underflow; use-after-free.\nWARNING: CPU: 26 PID: 3199 at lib/refcount.c:28\nrefcount_warn_saturate+0xb5/0x170\nModules linked in:\nCPU: 26 UID: 0 PID: 3199 Comm: nfsd Not tainted\n6.12.0-rc6-00079-g04ae226af01f-dirty #8\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS\n1.16.1-2.fc37 04/01/2014\nRIP: 0010:refcount_warn_saturate+0xb5/0x170\nCode: cc cc 0f b6 1d b3 20 a5 03 80 fb 01 0f 87 65 48 d8 00 83 e3 01 75\ne4 48 c7 c7 c0 3b 9b 85 c6 05 97 20 a5 03 01 e8 fb 3e 30 ff \u003c0f\u003e 0b eb\ncd 0f b6 1d 8a3\nRSP: 0018:ffffc90008637cd8 EFLAGS: 00010282\nRAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffffff83904fde\nRDX: dffffc0000000000 RSI: 0000000000000008 RDI: ffff88871ed36380\nRBP: ffff888158beeb40 R08: 0000000000000001 R09: fffff520010c6f56\nR10: ffffc90008637ab7 R11: 0000000000000001 R12: 0000000000000001\nR13: ffff888140e77400 R14: ffff888140e77408 R15: ffffffff858b42c0\nFS:  0000000000000000(0000) GS:ffff88871ed00000(0000)\nknlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000562384d32158 CR3: 000000055cc6a000 CR4: 00000000000006f0\nDR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000\nDR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400\nCall Trace:\n \u003cTASK\u003e\n ? refcount_warn_saturate+0xb5/0x170\n ? __warn+0xa5/0x140\n ? refcount_warn_saturate+0xb5/0x170\n ? report_bug+0x1b1/0x1e0\n ? handle_bug+0x53/0xa0\n ? exc_invalid_op+0x17/0x40\n ? asm_exc_invalid_op+0x1a/0x20\n ? tick_nohz_tick_stopped+0x1e/0x40\n ? refcount_warn_saturate+0xb5/0x170\n ? refcount_warn_saturate+0xb5/0x170\n nfs3svc_release_getacl+0xc9/0xe0\n svc_process_common+0x5db/0xb60\n ? __pfx_svc_process_common+0x10/0x10\n ? __rcu_read_unlock+0x69/0xa0\n ? __pfx_nfsd_dispatch+0x10/0x10\n ? svc_xprt_received+0xa1/0x120\n ? xdr_init_decode+0x11d/0x190\n svc_process+0x2a7/0x330\n svc_handle_xprt+0x69d/0x940\n svc_recv+0x180/0x2d0\n nfsd+0x168/0x200\n ? __pfx_nfsd+0x10/0x10\n kthread+0x1a2/0x1e0\n ? kthread+0xf4/0x1e0\n ? __pfx_kthread+0x10/0x10\n ret_from_fork+0x34/0x60\n ? __pfx_kthread+0x10/0x10\n ret_from_fork_asm+0x1a/0x30\n \u003c/TASK\u003e\nKernel panic - not syncing: kernel: panic_on_warn set ...\n\nClear acl_access/acl_default after posix_acl_release is called to prevent\nUAF from being triggered.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21796",
          "url": "https://www.suse.com/security/cve/CVE-2025-21796"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238716 for CVE-2025-21796",
          "url": "https://bugzilla.suse.com/1238716"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21796"
    },
    {
      "cve": "CVE-2025-21802",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21802"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnet: hns3: fix oops when unload drivers paralleling\n\nWhen unload hclge driver, it tries to disable sriov first for each\nae_dev node from hnae3_ae_dev_list. If user unloads hns3 driver at\nthe time, because it removes all the ae_dev nodes, and it may cause\noops.\n\nBut we can\u0027t simply use hnae3_common_lock for this. Because in the\nprocess flow of pci_disable_sriov(), it will trigger the remove flow\nof VF, which will also take hnae3_common_lock.\n\nTo fixes it, introduce a new mutex to protect the unload process.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21802",
          "url": "https://www.suse.com/security/cve/CVE-2025-21802"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1238751 for CVE-2025-21802",
          "url": "https://bugzilla.suse.com/1238751"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21802"
    },
    {
      "cve": "CVE-2025-21821",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21821"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nfbdev: omap: use threaded IRQ for LCD DMA\n\nWhen using touchscreen and framebuffer, Nokia 770 crashes easily with:\n\n    BUG: scheduling while atomic: irq/144-ads7846/82/0x00010000\n    Modules linked in: usb_f_ecm g_ether usb_f_rndis u_ether libcomposite configfs omap_udc ohci_omap ohci_hcd\n    CPU: 0 UID: 0 PID: 82 Comm: irq/144-ads7846 Not tainted 6.12.7-770 #2\n    Hardware name: Nokia 770\n    Call trace:\n     unwind_backtrace from show_stack+0x10/0x14\n     show_stack from dump_stack_lvl+0x54/0x5c\n     dump_stack_lvl from __schedule_bug+0x50/0x70\n     __schedule_bug from __schedule+0x4d4/0x5bc\n     __schedule from schedule+0x34/0xa0\n     schedule from schedule_preempt_disabled+0xc/0x10\n     schedule_preempt_disabled from __mutex_lock.constprop.0+0x218/0x3b4\n     __mutex_lock.constprop.0 from clk_prepare_lock+0x38/0xe4\n     clk_prepare_lock from clk_set_rate+0x18/0x154\n     clk_set_rate from sossi_read_data+0x4c/0x168\n     sossi_read_data from hwa742_read_reg+0x5c/0x8c\n     hwa742_read_reg from send_frame_handler+0xfc/0x300\n     send_frame_handler from process_pending_requests+0x74/0xd0\n     process_pending_requests from lcd_dma_irq_handler+0x50/0x74\n     lcd_dma_irq_handler from __handle_irq_event_percpu+0x44/0x130\n     __handle_irq_event_percpu from handle_irq_event+0x28/0x68\n     handle_irq_event from handle_level_irq+0x9c/0x170\n     handle_level_irq from generic_handle_domain_irq+0x2c/0x3c\n     generic_handle_domain_irq from omap1_handle_irq+0x40/0x8c\n     omap1_handle_irq from generic_handle_arch_irq+0x28/0x3c\n     generic_handle_arch_irq from call_with_stack+0x1c/0x24\n     call_with_stack from __irq_svc+0x94/0xa8\n    Exception stack(0xc5255da0 to 0xc5255de8)\n    5da0: 00000001 c22fc620 00000000 00000000 c08384a8 c106fc00 00000000 c240c248\n    5dc0: c113a600 c3f6ec30 00000001 00000000 c22fc620 c5255df0 c22fc620 c0279a94\n    5de0: 60000013 ffffffff\n     __irq_svc from clk_prepare_lock+0x4c/0xe4\n     clk_prepare_lock from clk_get_rate+0x10/0x74\n     clk_get_rate from uwire_setup_transfer+0x40/0x180\n     uwire_setup_transfer from spi_bitbang_transfer_one+0x2c/0x9c\n     spi_bitbang_transfer_one from spi_transfer_one_message+0x2d0/0x664\n     spi_transfer_one_message from __spi_pump_transfer_message+0x29c/0x498\n     __spi_pump_transfer_message from __spi_sync+0x1f8/0x2e8\n     __spi_sync from spi_sync+0x24/0x40\n     spi_sync from ads7846_halfd_read_state+0x5c/0x1c0\n     ads7846_halfd_read_state from ads7846_irq+0x58/0x348\n     ads7846_irq from irq_thread_fn+0x1c/0x78\n     irq_thread_fn from irq_thread+0x120/0x228\n     irq_thread from kthread+0xc8/0xe8\n     kthread from ret_from_fork+0x14/0x28\n\nAs a quick fix, switch to a threaded IRQ which provides a stable system.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21821",
          "url": "https://www.suse.com/security/cve/CVE-2025-21821"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239174 for CVE-2025-21821",
          "url": "https://bugzilla.suse.com/1239174"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21821"
    },
    {
      "cve": "CVE-2025-21831",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21831"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nPCI: Avoid putting some root ports into D3 on TUXEDO Sirius Gen1\n\ncommit 9d26d3a8f1b0 (\"PCI: Put PCIe ports into D3 during suspend\") sets the\npolicy that all PCIe ports are allowed to use D3.  When the system is\nsuspended if the port is not power manageable by the platform and won\u0027t be\nused for wakeup via a PME this sets up the policy for these ports to go\ninto D3hot.\n\nThis policy generally makes sense from an OSPM perspective but it leads to\nproblems with wakeup from suspend on the TUXEDO Sirius 16 Gen 1 with a\nspecific old BIOS. This manifests as a system hang.\n\nOn the affected Device + BIOS combination, add a quirk for the root port of\nthe problematic controller to ensure that these root ports are not put into\nD3hot at suspend.\n\nThis patch is based on\n\n  https://lore.kernel.org/linux-pci/20230708214457.1229-2-mario.limonciello@amd.com\n\nbut with the added condition both in the documentation and in the code to\napply only to the TUXEDO Sirius 16 Gen 1 with a specific old BIOS and only\nthe affected root ports.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21831",
          "url": "https://www.suse.com/security/cve/CVE-2025-21831"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239039 for CVE-2025-21831",
          "url": "https://bugzilla.suse.com/1239039"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21831"
    },
    {
      "cve": "CVE-2025-21846",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21846"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nacct: perform last write from workqueue\n\nIn [1] it was reported that the acct(2) system call can be used to\ntrigger NULL deref in cases where it is set to write to a file that\ntriggers an internal lookup. This can e.g., happen when pointing acc(2)\nto /sys/power/resume. At the point the where the write to this file\nhappens the calling task has already exited and called exit_fs(). A\nlookup will thus trigger a NULL-deref when accessing current-\u003efs.\n\nReorganize the code so that the the final write happens from the\nworkqueue but with the caller\u0027s credentials. This preserves the\n(strange) permission model and has almost no regression risk.\n\nThis api should stop to exist though.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21846",
          "url": "https://www.suse.com/security/cve/CVE-2025-21846"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239508 for CVE-2025-21846",
          "url": "https://bugzilla.suse.com/1239508"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21846"
    },
    {
      "cve": "CVE-2025-21848",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21848"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nnfp: bpf: Add check for nfp_app_ctrl_msg_alloc()\n\nAdd check for the return value of nfp_app_ctrl_msg_alloc() in\nnfp_bpf_cmsg_alloc() to prevent null pointer dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21848",
          "url": "https://www.suse.com/security/cve/CVE-2025-21848"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239479 for CVE-2025-21848",
          "url": "https://bugzilla.suse.com/1239479"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21848"
    },
    {
      "cve": "CVE-2025-21855",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21855"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nibmvnic: Don\u0027t reference skb after sending to VIOS\n\nPreviously, after successfully flushing the xmit buffer to VIOS,\nthe tx_bytes stat was incremented by the length of the skb.\n\nIt is invalid to access the skb memory after sending the buffer to\nthe VIOS because, at any point after sending, the VIOS can trigger\nan interrupt to free this memory. A race between reading skb-\u003elen\nand freeing the skb is possible (especially during LPM) and will\nresult in use-after-free:\n ==================================================================\n BUG: KASAN: slab-use-after-free in ibmvnic_xmit+0x75c/0x1808 [ibmvnic]\n Read of size 4 at addr c00000024eb48a70 by task hxecom/14495\n \u003c...\u003e\n Call Trace:\n [c000000118f66cf0] [c0000000018cba6c] dump_stack_lvl+0x84/0xe8 (unreliable)\n [c000000118f66d20] [c0000000006f0080] print_report+0x1a8/0x7f0\n [c000000118f66df0] [c0000000006f08f0] kasan_report+0x128/0x1f8\n [c000000118f66f00] [c0000000006f2868] __asan_load4+0xac/0xe0\n [c000000118f66f20] [c0080000046eac84] ibmvnic_xmit+0x75c/0x1808 [ibmvnic]\n [c000000118f67340] [c0000000014be168] dev_hard_start_xmit+0x150/0x358\n \u003c...\u003e\n Freed by task 0:\n kasan_save_stack+0x34/0x68\n kasan_save_track+0x2c/0x50\n kasan_save_free_info+0x64/0x108\n __kasan_mempool_poison_object+0x148/0x2d4\n napi_skb_cache_put+0x5c/0x194\n net_tx_action+0x154/0x5b8\n handle_softirqs+0x20c/0x60c\n do_softirq_own_stack+0x6c/0x88\n \u003c...\u003e\n The buggy address belongs to the object at c00000024eb48a00 which\n  belongs to the cache skbuff_head_cache of size 224\n==================================================================",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21855",
          "url": "https://www.suse.com/security/cve/CVE-2025-21855"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239484 for CVE-2025-21855",
          "url": "https://bugzilla.suse.com/1239484"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.4,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21855"
    },
    {
      "cve": "CVE-2025-21858",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21858"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngeneve: Fix use-after-free in geneve_find_dev().\n\nsyzkaller reported a use-after-free in geneve_find_dev() [0]\nwithout repro.\n\ngeneve_configure() links struct geneve_dev.next to\nnet_generic(net, geneve_net_id)-\u003egeneve_list.\n\nThe net here could differ from dev_net(dev) if IFLA_NET_NS_PID,\nIFLA_NET_NS_FD, or IFLA_TARGET_NETNSID is set.\n\nWhen dev_net(dev) is dismantled, geneve_exit_batch_rtnl() finally\ncalls unregister_netdevice_queue() for each dev in the netns,\nand later the dev is freed.\n\nHowever, its geneve_dev.next is still linked to the backend UDP\nsocket netns.\n\nThen, use-after-free will occur when another geneve dev is created\nin the netns.\n\nLet\u0027s call geneve_dellink() instead in geneve_destroy_tunnels().\n\n[0]:\nBUG: KASAN: slab-use-after-free in geneve_find_dev drivers/net/geneve.c:1295 [inline]\nBUG: KASAN: slab-use-after-free in geneve_configure+0x234/0x858 drivers/net/geneve.c:1343\nRead of size 2 at addr ffff000054d6ee24 by task syz.1.4029/13441\n\nCPU: 1 UID: 0 PID: 13441 Comm: syz.1.4029 Not tainted 6.13.0-g0ad9617c78ac #24 dc35ca22c79fb82e8e7bc5c9c9adafea898b1e3d\nHardware name: linux,dummy-virt (DT)\nCall trace:\n show_stack+0x38/0x50 arch/arm64/kernel/stacktrace.c:466 (C)\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0xbc/0x108 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x16c/0x6f0 mm/kasan/report.c:489\n kasan_report+0xc0/0x120 mm/kasan/report.c:602\n __asan_report_load2_noabort+0x20/0x30 mm/kasan/report_generic.c:379\n geneve_find_dev drivers/net/geneve.c:1295 [inline]\n geneve_configure+0x234/0x858 drivers/net/geneve.c:1343\n geneve_newlink+0xb8/0x128 drivers/net/geneve.c:1634\n rtnl_newlink_create+0x23c/0x868 net/core/rtnetlink.c:3795\n __rtnl_newlink net/core/rtnetlink.c:3906 [inline]\n rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021\n rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911\n netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543\n rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938\n netlink_unicast_kernel net/netlink/af_netlink.c:1322 [inline]\n netlink_unicast+0x618/0x838 net/netlink/af_netlink.c:1348\n netlink_sendmsg+0x5fc/0x8b0 net/netlink/af_netlink.c:1892\n sock_sendmsg_nosec net/socket.c:713 [inline]\n __sock_sendmsg net/socket.c:728 [inline]\n ____sys_sendmsg+0x410/0x6f8 net/socket.c:2568\n ___sys_sendmsg+0x178/0x1d8 net/socket.c:2622\n __sys_sendmsg net/socket.c:2654 [inline]\n __do_sys_sendmsg net/socket.c:2659 [inline]\n __se_sys_sendmsg net/socket.c:2657 [inline]\n __arm64_sys_sendmsg+0x12c/0x1c8 net/socket.c:2657\n __invoke_syscall arch/arm64/kernel/syscall.c:35 [inline]\n invoke_syscall+0x90/0x278 arch/arm64/kernel/syscall.c:49\n el0_svc_common+0x13c/0x250 arch/arm64/kernel/syscall.c:132\n do_el0_svc+0x54/0x70 arch/arm64/kernel/syscall.c:151\n el0_svc+0x4c/0xa8 arch/arm64/kernel/entry-common.c:744\n el0t_64_sync_handler+0x78/0x108 arch/arm64/kernel/entry-common.c:762\n el0t_64_sync+0x198/0x1a0 arch/arm64/kernel/entry.S:600\n\nAllocated by task 13247:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x30/0x68 mm/kasan/common.c:68\n kasan_save_alloc_info+0x44/0x58 mm/kasan/generic.c:568\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x84/0xa0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __do_kmalloc_node mm/slub.c:4298 [inline]\n __kmalloc_node_noprof+0x2a0/0x560 mm/slub.c:4304\n __kvmalloc_node_noprof+0x9c/0x230 mm/util.c:645\n alloc_netdev_mqs+0xb8/0x11a0 net/core/dev.c:11470\n rtnl_create_link+0x2b8/0xb50 net/core/rtnetlink.c:3604\n rtnl_newlink_create+0x19c/0x868 net/core/rtnetlink.c:3780\n __rtnl_newlink net/core/rtnetlink.c:3906 [inline]\n rtnl_newlink+0x1054/0x1630 net/core/rtnetlink.c:4021\n rtnetlink_rcv_msg+0x61c/0x918 net/core/rtnetlink.c:6911\n netlink_rcv_skb+0x1dc/0x398 net/netlink/af_netlink.c:2543\n rtnetlink_rcv+0x34/0x50 net/core/rtnetlink.c:6938\n netlink_unicast_kernel net/netlink/af_n\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21858",
          "url": "https://www.suse.com/security/cve/CVE-2025-21858"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239468 for CVE-2025-21858",
          "url": "https://bugzilla.suse.com/1239468"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21858"
    },
    {
      "cve": "CVE-2025-21865",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21865"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ngtp: Suppress list corruption splat in gtp_net_exit_batch_rtnl().\n\nBrad Spengler reported the list_del() corruption splat in\ngtp_net_exit_batch_rtnl(). [0]\n\nCommit eb28fd76c0a0 (\"gtp: Destroy device along with udp socket\u0027s netns\ndismantle.\") added the for_each_netdev() loop in gtp_net_exit_batch_rtnl()\nto destroy devices in each netns as done in geneve and ip tunnels.\n\nHowever, this could trigger -\u003edellink() twice for the same device during\n-\u003eexit_batch_rtnl().\n\nSay we have two netns A \u0026 B and gtp device B that resides in netns B but\nwhose UDP socket is in netns A.\n\n  1. cleanup_net() processes netns A and then B.\n\n  2. gtp_net_exit_batch_rtnl() finds the device B while iterating\n     netns A\u0027s gn-\u003egtp_dev_list and calls -\u003edellink().\n\n  [ device B is not yet unlinked from netns B\n    as unregister_netdevice_many() has not been called. ]\n\n  3. gtp_net_exit_batch_rtnl() finds the device B while iterating\n     netns B\u0027s for_each_netdev() and calls -\u003edellink().\n\ngtp_dellink() cleans up the device\u0027s hash table, unlinks the dev from\ngn-\u003egtp_dev_list, and calls unregister_netdevice_queue().\n\nBasically, calling gtp_dellink() multiple times is fine unless\nCONFIG_DEBUG_LIST is enabled.\n\nLet\u0027s remove for_each_netdev() in gtp_net_exit_batch_rtnl() and\ndelegate the destruction to default_device_exit_batch() as done\nin bareudp.\n\n[0]:\nlist_del corruption, ffff8880aaa62c00-\u003enext (autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]) is LIST_POISON1 (ffffffffffffff02) (prev is 0xffffffffffffff04)\nkernel BUG at lib/list_debug.c:58!\nOops: invalid opcode: 0000 [#1] PREEMPT SMP KASAN\nCPU: 1 UID: 0 PID: 1804 Comm: kworker/u8:7 Tainted: G                T   6.12.13-grsec-full-20250211091339 #1\nTainted: [T]=RANDSTRUCT\nHardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.15.0-1 04/01/2014\nWorkqueue: netns cleanup_net\nRIP: 0010:[\u003cffffffff84947381\u003e] __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58\nCode: c2 76 91 31 c0 e8 9f b1 f7 fc 0f 0b 4d 89 f0 48 c7 c1 02 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 e0 c2 76 91 31 c0 e8 7f b1 f7 fc \u003c0f\u003e 0b 4d 89 e8 48 c7 c1 04 ff ff ff 48 89 ea 48 89 ee 48 c7 c7 60\nRSP: 0018:fffffe8040b4fbd0 EFLAGS: 00010283\nRAX: 00000000000000cc RBX: dffffc0000000000 RCX: ffffffff818c4054\nRDX: ffffffff84947381 RSI: ffffffff818d1512 RDI: 0000000000000000\nRBP: ffff8880aaa62c00 R08: 0000000000000001 R09: fffffbd008169f32\nR10: fffffe8040b4f997 R11: 0000000000000001 R12: a1988d84f24943e4\nR13: ffffffffffffff02 R14: ffffffffffffff04 R15: ffff8880aaa62c08\nRBX: kasan shadow of 0x0\nRCX: __wake_up_klogd.part.0+0x74/0xe0 kernel/printk/printk.c:4554\nRDX: __list_del_entry_valid_or_report+0x141/0x200 lib/list_debug.c:58\nRSI: vprintk+0x72/0x100 kernel/printk/printk_safe.c:71\nRBP: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc00/0x1000 [slab object]\nRSP: process kstack fffffe8040b4fbd0+0x7bd0/0x8000 [kworker/u8:7+netns 1804 ]\nR09: kasan shadow of process kstack fffffe8040b4f990+0x7990/0x8000 [kworker/u8:7+netns 1804 ]\nR10: process kstack fffffe8040b4f997+0x7997/0x8000 [kworker/u8:7+netns 1804 ]\nR15: autoslab_size_M_dev_P_net_core_dev_11127_8_1328_8_S_4096_A_64_n_139+0xc08/0x1000 [slab object]\nFS:  0000000000000000(0000) GS:ffff888116000000(0000) knlGS:0000000000000000\nCS:  0010 DS: 0000 ES: 0000 CR0: 0000000080050033\nCR2: 0000748f5372c000 CR3: 0000000015408000 CR4: 00000000003406f0 shadow CR4: 00000000003406f0\nStack:\n 0000000000000000 ffffffff8a0c35e7 ffffffff8a0c3603 ffff8880aaa62c00\n ffff8880aaa62c00 0000000000000004 ffff88811145311c 0000000000000005\n 0000000000000001 ffff8880aaa62000 fffffe8040b4fd40 ffffffff8a0c360d\nCall Trace:\n \u003cTASK\u003e\n [\u003cffffffff8a0c360d\u003e] __list_del_entry_valid include/linux/list.h:131 [inline] fffffe8040b4fc28\n [\u003cffffffff8a0c360d\u003e] __list_del_entry include/linux/list.h:248 [inline] fffffe8040b4fc28\n [\u003cffffffff8a0c360d\u003e] list_del include/linux/list.h:262 [inl\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21865",
          "url": "https://www.suse.com/security/cve/CVE-2025-21865"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1239481 for CVE-2025-21865",
          "url": "https://bugzilla.suse.com/1239481"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21865"
    },
    {
      "cve": "CVE-2025-21871",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21871"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ntee: optee: Fix supplicant wait loop\n\nOP-TEE supplicant is a user-space daemon and it\u0027s possible for it\nbe hung or crashed or killed in the middle of processing an OP-TEE\nRPC call. It becomes more complicated when there is incorrect shutdown\nordering of the supplicant process vs the OP-TEE client application which\ncan eventually lead to system hang-up waiting for the closure of the\nclient application.\n\nAllow the client process waiting in kernel for supplicant response to\nbe killed rather than indefinitely waiting in an unkillable state. Also,\na normal uninterruptible wait should not have resulted in the hung-task\nwatchdog getting triggered, but the endless loop would.\n\nThis fixes issues observed during system reboot/shutdown when supplicant\ngot hung for some reason or gets crashed/killed which lead to client\ngetting hung in an unkillable state. It in turn lead to system being in\nhung up state requiring hard power off/on to recover.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21871",
          "url": "https://www.suse.com/security/cve/CVE-2025-21871"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240183 for CVE-2025-21871",
          "url": "https://bugzilla.suse.com/1240183"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21871"
    },
    {
      "cve": "CVE-2025-21877",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21877"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusbnet: gl620a: fix endpoint checking in genelink_bind()\n\nSyzbot reports [1] a warning in usb_submit_urb() triggered by\ninconsistencies between expected and actually present endpoints\nin gl620a driver. Since genelink_bind() does not properly\nverify whether specified eps are in fact provided by the device,\nin this case, an artificially manufactured one, one may get a\nmismatch.\n\nFix the issue by resorting to a usbnet utility function\nusbnet_get_endpoints(), usually reserved for this very problem.\nCheck for endpoints and return early before proceeding further if\nany are missing.\n\n[1] Syzbot report:\nusb 5-1: Manufacturer: syz\nusb 5-1: SerialNumber: syz\nusb 5-1: config 0 descriptor??\ngl620a 5-1:0.23 usb0: register \u0027gl620a\u0027 at usb-dummy_hcd.0-1, ...\n------------[ cut here ]------------\nusb 5-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 2 PID: 1841 at drivers/usb/core/urb.c:503 usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503\nModules linked in:\nCPU: 2 UID: 0 PID: 1841 Comm: kworker/2:2 Not tainted 6.12.0-syzkaller-07834-g06afb0f36106 #0\nHardware name: QEMU Standard PC (Q35 + ICH9, 2009), BIOS 1.16.3-debian-1.16.3-2~bpo12+1 04/01/2014\nWorkqueue: mld mld_ifc_work\nRIP: 0010:usb_submit_urb+0xe4b/0x1730 drivers/usb/core/urb.c:503\n...\nCall Trace:\n \u003cTASK\u003e\n usbnet_start_xmit+0x6be/0x2780 drivers/net/usb/usbnet.c:1467\n __netdev_start_xmit include/linux/netdevice.h:5002 [inline]\n netdev_start_xmit include/linux/netdevice.h:5011 [inline]\n xmit_one net/core/dev.c:3590 [inline]\n dev_hard_start_xmit+0x9a/0x7b0 net/core/dev.c:3606\n sch_direct_xmit+0x1ae/0xc30 net/sched/sch_generic.c:343\n __dev_xmit_skb net/core/dev.c:3827 [inline]\n __dev_queue_xmit+0x13d4/0x43e0 net/core/dev.c:4400\n dev_queue_xmit include/linux/netdevice.h:3168 [inline]\n neigh_resolve_output net/core/neighbour.c:1514 [inline]\n neigh_resolve_output+0x5bc/0x950 net/core/neighbour.c:1494\n neigh_output include/net/neighbour.h:539 [inline]\n ip6_finish_output2+0xb1b/0x2070 net/ipv6/ip6_output.c:141\n __ip6_finish_output net/ipv6/ip6_output.c:215 [inline]\n ip6_finish_output+0x3f9/0x1360 net/ipv6/ip6_output.c:226\n NF_HOOK_COND include/linux/netfilter.h:303 [inline]\n ip6_output+0x1f8/0x540 net/ipv6/ip6_output.c:247\n dst_output include/net/dst.h:450 [inline]\n NF_HOOK include/linux/netfilter.h:314 [inline]\n NF_HOOK include/linux/netfilter.h:308 [inline]\n mld_sendpack+0x9f0/0x11d0 net/ipv6/mcast.c:1819\n mld_send_cr net/ipv6/mcast.c:2120 [inline]\n mld_ifc_work+0x740/0xca0 net/ipv6/mcast.c:2651\n process_one_work+0x9c5/0x1ba0 kernel/workqueue.c:3229\n process_scheduled_works kernel/workqueue.c:3310 [inline]\n worker_thread+0x6c8/0xf00 kernel/workqueue.c:3391\n kthread+0x2c1/0x3a0 kernel/kthread.c:389\n ret_from_fork+0x45/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \u003c/TASK\u003e",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21877",
          "url": "https://www.suse.com/security/cve/CVE-2025-21877"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240172 for CVE-2025-21877",
          "url": "https://bugzilla.suse.com/1240172"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21877"
    },
    {
      "cve": "CVE-2025-21891",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21891"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nipvlan: ensure network headers are in skb linear part\n\nsyzbot found that ipvlan_process_v6_outbound() was assuming\nthe IPv6 network header isis present in skb-\u003ehead [1]\n\nAdd the needed pskb_network_may_pull() calls for both\nIPv4 and IPv6 handlers.\n\n[1]\nBUG: KMSAN: uninit-value in __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47\n  __ipv6_addr_type+0xa2/0x490 net/ipv6/addrconf_core.c:47\n  ipv6_addr_type include/net/ipv6.h:555 [inline]\n  ip6_route_output_flags_noref net/ipv6/route.c:2616 [inline]\n  ip6_route_output_flags+0x51/0x720 net/ipv6/route.c:2651\n  ip6_route_output include/net/ip6_route.h:93 [inline]\n  ipvlan_route_v6_outbound+0x24e/0x520 drivers/net/ipvlan/ipvlan_core.c:476\n  ipvlan_process_v6_outbound drivers/net/ipvlan/ipvlan_core.c:491 [inline]\n  ipvlan_process_outbound drivers/net/ipvlan/ipvlan_core.c:541 [inline]\n  ipvlan_xmit_mode_l3 drivers/net/ipvlan/ipvlan_core.c:605 [inline]\n  ipvlan_queue_xmit+0xd72/0x1780 drivers/net/ipvlan/ipvlan_core.c:671\n  ipvlan_start_xmit+0x5b/0x210 drivers/net/ipvlan/ipvlan_main.c:223\n  __netdev_start_xmit include/linux/netdevice.h:5150 [inline]\n  netdev_start_xmit include/linux/netdevice.h:5159 [inline]\n  xmit_one net/core/dev.c:3735 [inline]\n  dev_hard_start_xmit+0x247/0xa20 net/core/dev.c:3751\n  sch_direct_xmit+0x399/0xd40 net/sched/sch_generic.c:343\n  qdisc_restart net/sched/sch_generic.c:408 [inline]\n  __qdisc_run+0x14da/0x35d0 net/sched/sch_generic.c:416\n  qdisc_run+0x141/0x4d0 include/net/pkt_sched.h:127\n  net_tx_action+0x78b/0x940 net/core/dev.c:5484\n  handle_softirqs+0x1a0/0x7c0 kernel/softirq.c:561\n  __do_softirq+0x14/0x1a kernel/softirq.c:595\n  do_softirq+0x9a/0x100 kernel/softirq.c:462\n  __local_bh_enable_ip+0x9f/0xb0 kernel/softirq.c:389\n  local_bh_enable include/linux/bottom_half.h:33 [inline]\n  rcu_read_unlock_bh include/linux/rcupdate.h:919 [inline]\n  __dev_queue_xmit+0x2758/0x57d0 net/core/dev.c:4611\n  dev_queue_xmit include/linux/netdevice.h:3311 [inline]\n  packet_xmit+0x9c/0x6c0 net/packet/af_packet.c:276\n  packet_snd net/packet/af_packet.c:3132 [inline]\n  packet_sendmsg+0x93e0/0xa7e0 net/packet/af_packet.c:3164\n  sock_sendmsg_nosec net/socket.c:718 [inline]",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21891",
          "url": "https://www.suse.com/security/cve/CVE-2025-21891"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240186 for CVE-2025-21891",
          "url": "https://bugzilla.suse.com/1240186"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21891"
    },
    {
      "cve": "CVE-2025-21916",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21916"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nusb: atm: cxacru: fix a flaw in existing endpoint checks\n\nSyzbot once again identified a flaw in usb endpoint checking, see [1].\nThis time the issue stems from a commit authored by me (2eabb655a968\n(\"usb: atm: cxacru: fix endpoint checking in cxacru_bind()\")).\n\nWhile using usb_find_common_endpoints() may usually be enough to\ndiscard devices with wrong endpoints, in this case one needs more\nthan just finding and identifying the sufficient number of endpoints\nof correct types - one needs to check the endpoint\u0027s address as well.\n\nSince cxacru_bind() fills URBs with CXACRU_EP_CMD address in mind,\nswitch the endpoint verification approach to usb_check_XXX_endpoints()\ninstead to fix incomplete ep testing.\n\n[1] Syzbot report:\nusb 5-1: BOGUS urb xfer, pipe 3 != type 1\nWARNING: CPU: 0 PID: 1378 at drivers/usb/core/urb.c:504 usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nRIP: 0010:usb_submit_urb+0xc4e/0x18c0 drivers/usb/core/urb.c:503\n...\nCall Trace:\n \u003cTASK\u003e\n cxacru_cm+0x3c8/0xe50 drivers/usb/atm/cxacru.c:649\n cxacru_card_status drivers/usb/atm/cxacru.c:760 [inline]\n cxacru_bind+0xcf9/0x1150 drivers/usb/atm/cxacru.c:1223\n usbatm_usb_probe+0x314/0x1d30 drivers/usb/atm/usbatm.c:1058\n cxacru_usb_probe+0x184/0x220 drivers/usb/atm/cxacru.c:1377\n usb_probe_interface+0x641/0xbb0 drivers/usb/core/driver.c:396\n really_probe+0x2b9/0xad0 drivers/base/dd.c:658\n __driver_probe_device+0x1a2/0x390 drivers/base/dd.c:800\n driver_probe_device+0x50/0x430 drivers/base/dd.c:830\n...",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21916",
          "url": "https://www.suse.com/security/cve/CVE-2025-21916"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240582 for CVE-2025-21916",
          "url": "https://bugzilla.suse.com/1240582"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21916"
    },
    {
      "cve": "CVE-2025-21922",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21922"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nppp: Fix KMSAN uninit-value warning with bpf\n\nSyzbot caught an \"KMSAN: uninit-value\" warning [1], which is caused by the\nppp driver not initializing a 2-byte header when using socket filter.\n\nThe following code can generate a PPP filter BPF program:\n\u0027\u0027\u0027\nstruct bpf_program fp;\npcap_t *handle;\nhandle = pcap_open_dead(DLT_PPP_PPPD, 65535);\npcap_compile(handle, \u0026fp, \"ip and outbound\", 0, 0);\nbpf_dump(\u0026fp, 1);\n\u0027\u0027\u0027\nIts output is:\n\u0027\u0027\u0027\n(000) ldh [2]\n(001) jeq #0x21 jt 2 jf 5\n(002) ldb [0]\n(003) jeq #0x1 jt 4 jf 5\n(004) ret #65535\n(005) ret #0\n\u0027\u0027\u0027\nWen can find similar code at the following link:\nhttps://github.com/ppp-project/ppp/blob/master/pppd/options.c#L1680\nThe maintainer of this code repository is also the original maintainer\nof the ppp driver.\n\nAs you can see the BPF program skips 2 bytes of data and then reads the\n\u0027Protocol\u0027 field to determine if it\u0027s an IP packet. Then it read the first\nbyte of the first 2 bytes to determine the direction.\n\nThe issue is that only the first byte indicating direction is initialized\nin current ppp driver code while the second byte is not initialized.\n\nFor normal BPF programs generated by libpcap, uninitialized data won\u0027t be\nused, so it\u0027s not a problem. However, for carefully crafted BPF programs,\nsuch as those generated by syzkaller [2], which start reading from offset\n0, the uninitialized data will be used and caught by KMSAN.\n\n[1] https://syzkaller.appspot.com/bug?extid=853242d9c9917165d791\n[2] https://syzkaller.appspot.com/text?tag=ReproC\u0026x=11994913980000",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21922",
          "url": "https://www.suse.com/security/cve/CVE-2025-21922"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240639 for CVE-2025-21922",
          "url": "https://bugzilla.suse.com/1240639"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 6.1,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21922"
    },
    {
      "cve": "CVE-2025-21934",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21934"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrapidio: fix an API misues when rio_add_net() fails\n\nrio_add_net() calls device_register() and fails when device_register()\nfails.  Thus, put_device() should be used rather than kfree().  Add\n\"mport-\u003enet = NULL;\" to avoid a use after free issue.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21934",
          "url": "https://www.suse.com/security/cve/CVE-2025-21934"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240708 for CVE-2025-21934",
          "url": "https://bugzilla.suse.com/1240708"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21934"
    },
    {
      "cve": "CVE-2025-21935",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21935"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nrapidio: add check for rio_add_net() in rio_scan_alloc_net()\n\nThe return value of rio_add_net() should be checked.  If it fails,\nput_device() should be called to free the memory and give up the reference\ninitialized in rio_add_net().",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21935",
          "url": "https://www.suse.com/security/cve/CVE-2025-21935"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240700 for CVE-2025-21935",
          "url": "https://bugzilla.suse.com/1240700"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21935"
    },
    {
      "cve": "CVE-2025-21969",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21969"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: L2CAP: Fix slab-use-after-free Read in l2cap_send_cmd\n\nAfter the hci sync command releases l2cap_conn, the hci receive data work\nqueue references the released l2cap_conn when sending to the upper layer.\nAdd hci dev lock to the hci receive data work queue to synchronize the two.\n\n[1]\nBUG: KASAN: slab-use-after-free in l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\nRead of size 8 at addr ffff8880271a4000 by task kworker/u9:2/5837\n\nCPU: 0 UID: 0 PID: 5837 Comm: kworker/u9:2 Not tainted 6.13.0-rc5-syzkaller-00163-gab75170520d4 #0\nHardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 09/13/2024\nWorkqueue: hci1 hci_rx_work\nCall Trace:\n \u003cTASK\u003e\n __dump_stack lib/dump_stack.c:94 [inline]\n dump_stack_lvl+0x241/0x360 lib/dump_stack.c:120\n print_address_description mm/kasan/report.c:378 [inline]\n print_report+0x169/0x550 mm/kasan/report.c:489\n kasan_report+0x143/0x180 mm/kasan/report.c:602\n l2cap_build_cmd net/bluetooth/l2cap_core.c:2964 [inline]\n l2cap_send_cmd+0x187/0x8d0 net/bluetooth/l2cap_core.c:954\n l2cap_sig_send_rej net/bluetooth/l2cap_core.c:5502 [inline]\n l2cap_sig_channel net/bluetooth/l2cap_core.c:5538 [inline]\n l2cap_recv_frame+0x221f/0x10db0 net/bluetooth/l2cap_core.c:6817\n hci_acldata_packet net/bluetooth/hci_core.c:3797 [inline]\n hci_rx_work+0x508/0xdb0 net/bluetooth/hci_core.c:4040\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n \u003c/TASK\u003e\n\nAllocated by task 5837:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n poison_kmalloc_redzone mm/kasan/common.c:377 [inline]\n __kasan_kmalloc+0x98/0xb0 mm/kasan/common.c:394\n kasan_kmalloc include/linux/kasan.h:260 [inline]\n __kmalloc_cache_noprof+0x243/0x390 mm/slub.c:4329\n kmalloc_noprof include/linux/slab.h:901 [inline]\n kzalloc_noprof include/linux/slab.h:1037 [inline]\n l2cap_conn_add+0xa9/0x8e0 net/bluetooth/l2cap_core.c:6860\n l2cap_connect_cfm+0x115/0x1090 net/bluetooth/l2cap_core.c:7239\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_remote_features_evt+0x68e/0xac0 net/bluetooth/hci_event.c:3726\n hci_event_func net/bluetooth/hci_event.c:7473 [inline]\n hci_event_packet+0xac2/0x1540 net/bluetooth/hci_event.c:7525\n hci_rx_work+0x3f3/0xdb0 net/bluetooth/hci_core.c:4035\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entry_64.S:244\n\nFreed by task 54:\n kasan_save_stack mm/kasan/common.c:47 [inline]\n kasan_save_track+0x3f/0x80 mm/kasan/common.c:68\n kasan_save_free_info+0x40/0x50 mm/kasan/generic.c:582\n poison_slab_object mm/kasan/common.c:247 [inline]\n __kasan_slab_free+0x59/0x70 mm/kasan/common.c:264\n kasan_slab_free include/linux/kasan.h:233 [inline]\n slab_free_hook mm/slub.c:2353 [inline]\n slab_free mm/slub.c:4613 [inline]\n kfree+0x196/0x430 mm/slub.c:4761\n l2cap_connect_cfm+0xcc/0x1090 net/bluetooth/l2cap_core.c:7235\n hci_connect_cfm include/net/bluetooth/hci_core.h:2057 [inline]\n hci_conn_failed+0x287/0x400 net/bluetooth/hci_conn.c:1266\n hci_abort_conn_sync+0x56c/0x11f0 net/bluetooth/hci_sync.c:5603\n hci_cmd_sync_work+0x22b/0x400 net/bluetooth/hci_sync.c:332\n process_one_work kernel/workqueue.c:3229 [inline]\n process_scheduled_works+0xa66/0x1840 kernel/workqueue.c:3310\n worker_thread+0x870/0xd30 kernel/workqueue.c:3391\n kthread+0x2f0/0x390 kernel/kthread.c:389\n ret_from_fork+0x4b/0x80 arch/x86/kernel/process.c:147\n ret_from_fork_asm+0x1a/0x30 arch/x86/entry/entr\n---truncated---",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21969",
          "url": "https://www.suse.com/security/cve/CVE-2025-21969"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240784 for CVE-2025-21969",
          "url": "https://bugzilla.suse.com/1240784"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21969"
    },
    {
      "cve": "CVE-2025-21993",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21993"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\niscsi_ibft: Fix UBSAN shift-out-of-bounds warning in ibft_attr_show_nic()\n\nWhen performing an iSCSI boot using IPv6, iscsistart still reads the\n/sys/firmware/ibft/ethernetX/subnet-mask entry. Since the IPv6 prefix\nlength is 64, this causes the shift exponent to become negative,\ntriggering a UBSAN warning. As the concept of a subnet mask does not\napply to IPv6, the value is set to ~0 to suppress the warning message.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21993",
          "url": "https://www.suse.com/security/cve/CVE-2025-21993"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240797 for CVE-2025-21993",
          "url": "https://bugzilla.suse.com/1240797"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21993"
    },
    {
      "cve": "CVE-2025-21996",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-21996"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\ndrm/radeon: fix uninitialized size issue in radeon_vce_cs_parse()\n\nOn the off chance that command stream passed from userspace via\nioctl() call to radeon_vce_cs_parse() is weirdly crafted and\nfirst command to execute is to encode (case 0x03000001), the function\nin question will attempt to call radeon_vce_cs_reloc() with size\nargument that has not been properly initialized. Specifically, \u0027size\u0027\nwill point to \u0027tmp\u0027 variable before the latter had a chance to be\nassigned any value.\n\nPlay it safe and init \u0027tmp\u0027 with 0, thus ensuring that\nradeon_vce_cs_reloc() will catch an early error in cases like these.\n\nFound by Linux Verification Center (linuxtesting.org) with static\nanalysis tool SVACE.\n\n(cherry picked from commit 2d52de55f9ee7aaee0e09ac443f77855989c6b68)",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-21996",
          "url": "https://www.suse.com/security/cve/CVE-2025-21996"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240801 for CVE-2025-21996",
          "url": "https://bugzilla.suse.com/1240801"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-21996"
    },
    {
      "cve": "CVE-2025-22007",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-22007"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "In the Linux kernel, the following vulnerability has been resolved:\n\nBluetooth: Fix error code in chan_alloc_skb_cb()\n\nThe chan_alloc_skb_cb() function is supposed to return error pointers on\nerror.  Returning NULL will lead to a NULL dereference.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
          "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
          "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
          "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-22007",
          "url": "https://www.suse.com/security/cve/CVE-2025-22007"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1240829 for CVE-2025-22007",
          "url": "https://bugzilla.suse.com/1240829"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.5,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.ppc64le",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.s390x",
            "SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_255-default-1-8.5.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-default-man-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.aarch64",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.ppc64le",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.s390x",
            "SUSE Linux Enterprise Server 12 SP5-LTSS:ocfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:cluster-md-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:dlm-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:gfs2-kmp-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-base-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-default-devel-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-devel-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-macros-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-source-4.12.14-122.255.1.noarch",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:kernel-syms-4.12.14-122.255.1.x86_64",
            "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:ocfs2-kmp-default-4.12.14-122.255.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2025-04-16T07:51:20Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-22007"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…