{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"Security update for the Linux Kernel","title":"Title of the patch"},{"category":"description","text":"The SUSE Linux Enterprise 12 SP5 kernel was updated to receive various security and bugfixes.\n\nThe following security bug was fixed:\n\n- CVE-2021-3348: Fixed a use-after-free read in nbd_queue_rq (bsc#1181504).\n\nThe following non-security bugs were fixed:\n\n- ACPI: configfs: add missing check after configfs_register_default_group() (git-fixes).\n- ACPI: property: Fix fwnode string properties matching (git-fixes).\n- ACPI: property: Satisfy kernel doc validator (part 1) (git-fixes).\n- ALSA: usb-audio: Fix PCM buffer allocation in non-vmalloc mode (git-fixes).\n- arm64: Update config file. Set CONFIG_WATCHDOG_SYSFS to true (bsc#1182560)\n- ASoC: cs42l56: fix up error handling in probe (git-fixes).\n- ath9k: fix data bus crash when setting nf_override via debugfs (git-fixes).\n- block: fix use-after-free in disk_part_iter_next (bsc#1182610).\n- Bluetooth: btqcomsmd: Fix a resource leak in error handling paths in the probe function (git-fixes).\n- Bluetooth: drop HCI device reference before return (git-fixes).\n- Bluetooth: Fix initializing response id after clearing struct (git-fixes).\n- Bluetooth: Put HCI device if inquiry procedure interrupts (git-fixes).\n- bonding: Fix reference count leak in bond_sysfs_slave_add (git-fixes).\n- bonding: wait for sysfs kobject destruction before freeing struct slave (git-fixes).\n- BTRFS: Cleanup try_flush_qgroup (bsc#1182047).\n- BTRFS: correctly calculate item size used when item key collision happens (bsc#1181996).\n- BTRFS: correctly validate compression type (bsc#1182269).\n- BTRFS: delete the ordered isize update code (bsc#1181998).\n- BTRFS: Do not flush from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: do not set path->leave_spinning for truncate (bsc#1181998).\n- BTRFS: factor out extent dropping code from hole punch handler (bsc#1182038).\n- BTRFS: fix cloning range with a hole when using the NO_HOLES feature (bsc#1182038).\n- BTRFS: fix data bytes_may_use underflow with fallocate due to failed quota reserve (bsc#1182130)\n- BTRFS: fix ENOSPC errors, leading to transaction aborts, when cloning extents (bsc#1182038).\n- BTRFS: fix hole extent items with a zero size after range cloning (bsc#1182038).\n- BTRFS: fix lost i_size update after cloning inline extent (bsc#1181998).\n- BTRFS: fix mount failure caused by race with umount (bsc#1182248).\n- BTRFS: Fix race between extent freeing/allocation when using bitmaps (bsc#1181574).\n- BTRFS: fix unexpected cow in run_delalloc_nocow (bsc#1181987).\n- BTRFS: fix unexpected failure of nocow buffered writes after snapshotting when low on space (bsc#1181987).\n- BTRFS: Free correct amount of space in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: incremental send, fix file corruption when no-holes feature is enabled (bsc#1182184).\n- BTRFS: Introduce extent_io_tree::owner to distinguish different io_trees (bsc#1181998).\n- BTRFS: introduce per-inode file extent tree (bsc#1181998).\n- BTRFS: prepare for extensions in compression options (bsc#1182269).\n- BTRFS: prop: fix vanished compression property after failed set (bsc#1182269).\n- BTRFS: prop: fix zstd compression parameter validation (bsc#1182269).\n- BTRFS: Remove btrfs_inode from btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: replace all uses of btrfs_ordered_update_i_size (bsc#1181998).\n- BTRFS: send, allow clone operations within the same file (bsc#1182173)\n- BTRFS: send, do not issue unnecessary truncate operations (bsc#1182173)\n- BTRFS: send, fix emission of invalid clone operations within the same file (bsc#1182173)\n- BTRFS: send, fix incorrect file layout after hole punching beyond eof (bsc#1182173).\n- BTRFS: send: fix invalid clone operations when cloning from the same file and root (bsc#1182173)\n- BTRFS: send, fix missing truncate for inode with prealloc extent past eof (bsc#1182173).\n- BTRFS: send, orphanize first all conflicting inodes when processing references (bsc#1182243 bsc#1182242).\n- BTRFS: send, recompute reference path after orphanization of a directory (bsc#1182243).\n- BTRFS: Simplify code flow in btrfs_delayed_inode_reserve_metadata (bsc#1182047).\n- BTRFS: transaction: Avoid deadlock due to bad initialization timing of fs_info::journal_info (bsc#1181931).\n- BTRFS: Unlock extents in btrfs_zero_range in case of errors (bsc#1182047).\n- BTRFS: Use bd_dev to generate index when dev_state_hashtable add items (bsc#1181931).\n- BTRFS: use btrfs_ordered_update_i_size in clone_finish_inode_update (bsc#1181998).\n- BTRFS: use the file extent tree infrastructure (bsc#1181998).\n- cifs: report error instead of invalid when revalidating a dentry fails (bsc#1177440).\n- dm: avoid filesystem lookup in dm_get_dev_t() (bsc#1178049).\n- Drivers: hv: vmbus: Avoid use-after-free in vmbus_onoffer_rescind() (git-fixes).\n- Exclude Symbols.list again. Removing the exclude builds vanilla/linux-next builds. Fixes: 55877625c800 ('kernel-binary.spec.in: Package the obj_install_dir as explicit filelist.')\n- ext4: do not remount read-only with errors=continue on reboot (bsc#1182464).\n- ext4: fix a memory leak of ext4_free_data (bsc#1182447).\n- ext4: fix bug for rename with RENAME_WHITEOUT (bsc#1182449).\n- ext4: fix deadlock with fs freezing and EA inodes (bsc#1182463).\n- ext4: fix superblock checksum failure when setting password salt (bsc#1182465).\n- fgraph: Initialize tracing_graph_pause at task creation (git-fixes).\n- firmware: imx: select SOC_BUS to fix firmware build (git-fixes).\n- Fix unsynchronized access to sev members through svm_register_enc_region (bsc#1114648).\n- fs: fix lazytime expiration handling in __writeback_single_inode() (bsc#1182466).\n- fs: move I_DIRTY_INODE to fs.h (bsc#1182612). \n- HID: core: detect and skip invalid inputs to snto32() (git-fixes).\n- HID: wacom: Ignore attempts to overwrite the touch_max value from HID (git-fixes).\n- hwrng: timeriomem - Fix cooldown period calculation (git-fixes).\n- ibmvnic: Clear failover_pending if unable to schedule (bsc#1181960 ltc#190997).\n- ibmvnic: device remove has higher precedence over reset (bsc#1065729).\n- ibmvnic: fix a race between open and reset (bsc#1176855 ltc#187293).\n- ibmvnic: fix login buffer memory leak (bsc#1081134 ltc#164631).\n- ibmvnic: serialize access to work queue on remove (bsc#1065729).\n- ibmvnic: Set to CLOSED state even on error (bsc#1084610 ltc#165122 git-fixes).\n- Input: elo - fix an error code in elo_connect() (git-fixes).\n- Input: joydev - prevent potential read overflow in ioctl (git-fixes).\n- iwlwifi: exclude GEO SAR support for 3168 (git-fixes).\n- kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- kernel-binary.spec: Add back initrd and image symlink ghosts to filelist (bsc#1182140). Fixes: 76a9256314c3 ('rpm/kernel-{source,binary}.spec: do not include ghost symlinks (boo#1179082).')\n- kernfs: deal with kernfs_fill_super() failures (bsc#1181809).\n- KVM: apic: Flush TLB after APIC mode/address change if VPIDs are in use (bsc#1182302).\n- KVM: Fix kABI for set_virtual_apic_mode (bsc#1182310).\n- KVM: Fix kABI for tlb_flush (bsc#1182195).\n- kvm-vmx-Basic-APIC-virtualization-controls-have-thre.patch: (bsc#1182310).\n- KVM: VMX: check for existence of secondary exec controls before accessing (bsc#1182438).\n- KVM: VMX: hide flexpriority from guest when disabled at the module level (bsc#1182448).\n- kvm-vmx-Introduce-lapic_mode-enumeration.patch: (bsc#1182307).\n- KVM: x86: emulate RDPID (bsc#1182182).\n- KVM: x86: emulating RDPID failure shall return #UD rather than\n- KVM: X86: introduce invalidate_gpa argument to tlb flush (bsc#1182195).\n- libfs: fix error cast of negative value in simple_attr_write() (bsc#1179709).\n- libnvdimm/dimm: Avoid race between probe and available_slots_show() (bsc#1170442).\n- mac80211: fix potential overflow when multiplying to u32 integers (git-fixes).\n- media: cx25821: Fix a bug when reallocating some dma memory (git-fixes).\n- media: media/pci: Fix memleak in empress_init (git-fixes).\n- media: pwc: Use correct device for DMA (git-fixes).\n- media: pxa_camera: declare variable when DEBUG is defined (git-fixes).\n- media: qm1d1c0042: fix error return code in qm1d1c0042_init() (git-fixes).\n- media: tm6000: Fix memleak in tm6000_start_stream (git-fixes).\n- media: vsp1: Fix an error handling path in the probe function (git-fixes).\n- mfd: wm831x-auxadc: Prevent use after free in wm831x_auxadc_read_irq() (git-fixes).\n- misc: eeprom_93xx46: Add module alias to avoid breaking support for non device tree users (git-fixes).\n- misc: eeprom_93xx46: Fix module alias to enable module autoprobe (git-fixes).\n- mmc: usdhi6rol0: Fix a resource leak in the error handling path of the probe (git-fixes).\n- mm/pmem: avoid inserting hugepage PTE entry with fsdax if hugepage support is disabled (bsc#1181896 ltc#191273).\n- mm: thp: kABI: move the added flag to the end of enum (bsc#1181896 ltc#191273).\n- nbd: Fix memory leak in nbd_add_socket (bsc#1181504).\n- net: bcmgenet: add support for ethtool rxnfc flows (git-fixes).\n- net: bcmgenet: code movement (git-fixes).\n- net: bcmgenet: fix mask check in bcmgenet_validate_flow() (git-fixes).\n- net: bcmgenet: Fix WoL with password after deep sleep (git-fixes).\n- net: bcmgenet: re-remove bcmgenet_hfb_add_filter (git-fixes).\n- net: bcmgenet: set Rx mode before starting netif (git-fixes).\n- net: bcmgenet: use __be16 for htons(ETH_P_IP) (git-fixes).\n- net: bcmgenet: Use correct I/O accessors (git-fixes).\n- net: lpc-enet: fix error return code in lpc_mii_init() (git-fixes).\n- net/mlx4_en: Handle TX error CQE (bsc#1181854).\n- net: moxa: Fix a potential double 'free_irq()' (git-fixes).\n- net: sun: fix missing release regions in cas_init_one() (git-fixes).\n- nvme-multipath: Early exit if no path is available (git-fixes).\n- objtool: Do not fail on missing symbol table (bsc#1169514).\n- PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning (bsc#1182571 ltc#191345).\n- powerpc: Fix alignment bug within the init sections (bsc#1065729).\n- powerpc/perf: Exclude kernel samples while counting events in user space (bsc#1065729).\n- powerpc/perf/hv-24x7: Dont create sysfs event files for dummy events (bsc#1182118 ltc#190624).\n- powerpc/pseries/dlpar: handle ibm, configure-connector delay status (bsc#1181985 ltc#188074).\n- powerpc/pseries/eeh: Make pseries_pcibios_bus_add_device() static (bsc#1078720, git-fixes).\n- powerpc/pseries: extract host bridge from pci_bus prior to bus removal (bsc#1182171 ltc#190900).\n- powerpc/pseries/ras: Make init_ras_hotplug_IRQ() static (bsc#1065729. git-fixes).\n- power: reset: at91-sama5d2_shdwc: fix wkupdbc mask (git-fixes).\n- ptrace: reintroduce usage of subjective credentials in ptrace_has_cap() (bsc#1163930).\n- ptrace: Set PF_SUPERPRIV when checking capability (bsc#1163930).\n- quota: Fix error codes in v2_read_file_info() (bsc#1182652).\n- quota: Fix memory leak when handling corrupted quota file (bsc#1182650).\n- quota: Sanity-check quota file headers on load (bsc#1182461).\n- regulator: axp20x: Fix reference cout leak (git-fixes).\n- reiserfs: add check for an invalid ih_entry_count (bsc#1182462).\n- reset: hisilicon: correct vendor prefix (git-fixes).\n- rpm/post.sh: Avoid purge-kernel for the first installed kernel (bsc#1180058)\n- s390/pci: adaptation of iommu to multifunction (bsc#1179612).\n- s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#1179612).\n- scsi: qla2xxx: Fix description for parameter ql2xenforce_iocb_limit (bsc#1179142).\n- scsi: target: Fix truncated PR-in ReadKeys response (bsc#1182590).\n- scsi: target: fix unmap_zeroes_data boolean initialisation (bsc#1163617).\n- staging: rtl8723bs: wifi_regd.c: Fix incorrect number of regulatory rules (git-fixes).\n- tools lib traceevent: Fix 'robust' test of do_generate_dynamic_list_file (git-fixes).\n- tpm_tis: Clean up locality release (git-fixes).\n- tpm_tis: Fix check_locality for correct locality acquisition (git-fixes).\n- tracing: Check length before giving out the filter buffer (git-fixes).\n- tracing: Do not count ftrace events in top level enable output (git-fixes).\n- USB: cdc-acm: blacklist another IR Droid device (git-fixes).\n- USB: dwc2: Abort transaction after errors with unknown reason (git-fixes).\n- USB: dwc2: Make 'trimming xfer length' a debug message (git-fixes).\n- USB: musb: Fix runtime PM race in mUSB_queue_resume_work (git-fixes).\n- USB: serial: cp210x: add new VID/PID for supporting Teraoka AD2000 (git-fixes).\n- USB: serial: cp210x: add pid/vid for WSDA-200-USB (git-fixes).\n- USB: serial: mos7720: fix error code in mos7720_write() (git-fixes).\n- USB: serial: mos7720: improve OOM-handling in read_mos_reg() (git-fixes).\n- USB: serial: mos7840: fix error code in mos7840_write() (git-fixes).\n- USB: serial: option: Adding support for Cinterion MV31 (git-fixes).\n- USB: serial: option: add LongSung M5710 module support (git-fixes).\n- USB: uas: Add PNY USB Portable SSD to unusual_uas (git-fixes).\n- USB: usblp: fix DMA to stack (git-fixes).\n- vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#1179612).\n- vmxnet3: Remove buf_info from device accessible structures (bsc#1181671).\n- writeback: Drop I_DIRTY_TIME_EXPIRE (bsc#1182460).\n- x86/apic: Add extra serialization for non-serializing MSRs (bsc#1114648).\n- x86/efistub: Disable paging at mixed mode entry (bsc#1114648).\n- x86/entry/64/compat: Fix 'x86/entry/64/compat: Preserve r8-r11 in int $0x80' (bsc#1114648).\n- x86/entry/64/compat: Preserve r8-r11 in int $0x80 (bsc#1114648).\n- x86/resctrl: Fix incorrect local bandwidth when mba_sc is enabled (bsc#1114648).\n- x86/resctrl: Remove unused struct mbm_state::chunks_bw (bsc#1114648).\n- xen-blkfront: allow discard-* nodes to be optional (bsc#1181346).\n- xen/netback: avoid race in xenvif_rx_ring_slots_available() (bsc#1065600).\n- xen/netback: fix spurious event detection for common event case (bsc#1182175).\n- xfs: reduce quota reservation when doing a dax unwritten extent conversion (git-fixes bsc#1182561).\n- xhci: fix bounce buffer usage for non-sg list case (git-fixes).\n","title":"Description of the patch"},{"category":"details","text":"SUSE-2021-742,SUSE-SLE-HA-12-SP5-2021-742,SUSE-SLE-Live-Patching-12-SP5-2021-742,SUSE-SLE-SDK-12-SP5-2021-742,SUSE-SLE-SERVER-12-SP5-2021-742,SUSE-SLE-WE-12-SP5-2021-742","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/suse-su-2021_0742-1.json"},{"category":"self","summary":"URL for SUSE-SU-2021:0742-1","url":"https://www.suse.com/support/update/announcement/2021/suse-su-20210742-1/"},{"category":"self","summary":"E-Mail link for SUSE-SU-2021:0742-1","url":"https://lists.suse.com/pipermail/sle-security-updates/2021-March/008460.html"},{"category":"self","summary":"SUSE Bug 1065600","url":"https://bugzilla.suse.com/1065600"},{"category":"self","summary":"SUSE Bug 1065729","url":"https://bugzilla.suse.com/1065729"},{"category":"self","summary":"SUSE Bug 1078720","url":"https://bugzilla.suse.com/1078720"},{"category":"self","summary":"SUSE Bug 1081134","url":"https://bugzilla.suse.com/1081134"},{"category":"self","summary":"SUSE Bug 1084610","url":"https://bugzilla.suse.com/1084610"},{"category":"self","summary":"SUSE Bug 1114648","url":"https://bugzilla.suse.com/1114648"},{"category":"self","summary":"SUSE Bug 1163617","url":"https://bugzilla.suse.com/1163617"},{"category":"self","summary":"SUSE Bug 1163930","url":"https://bugzilla.suse.com/1163930"},{"category":"self","summary":"SUSE Bug 1169514","url":"https://bugzilla.suse.com/1169514"},{"category":"self","summary":"SUSE Bug 1170442","url":"https://bugzilla.suse.com/1170442"},{"category":"self","summary":"SUSE Bug 1176855","url":"https://bugzilla.suse.com/1176855"},{"category":"self","summary":"SUSE Bug 1177440","url":"https://bugzilla.suse.com/1177440"},{"category":"self","summary":"SUSE Bug 1178049","url":"https://bugzilla.suse.com/1178049"},{"category":"self","summary":"SUSE Bug 1179082","url":"https://bugzilla.suse.com/1179082"},{"category":"self","summary":"SUSE Bug 1179142","url":"https://bugzilla.suse.com/1179142"},{"category":"self","summary":"SUSE Bug 1179612","url":"https://bugzilla.suse.com/1179612"},{"category":"self","summary":"SUSE Bug 1179709","url":"https://bugzilla.suse.com/1179709"},{"category":"self","summary":"SUSE Bug 1180058","url":"https://bugzilla.suse.com/1180058"},{"category":"self","summary":"SUSE Bug 1181346","url":"https://bugzilla.suse.com/1181346"},{"category":"self","summary":"SUSE Bug 1181504","url":"https://bugzilla.suse.com/1181504"},{"category":"self","summary":"SUSE Bug 1181574","url":"https://bugzilla.suse.com/1181574"},{"category":"self","summary":"SUSE Bug 1181671","url":"https://bugzilla.suse.com/1181671"},{"category":"self","summary":"SUSE Bug 1181809","url":"https://bugzilla.suse.com/1181809"},{"category":"self","summary":"SUSE Bug 1181854","url":"https://bugzilla.suse.com/1181854"},{"category":"self","summary":"SUSE Bug 1181896","url":"https://bugzilla.suse.com/1181896"},{"category":"self","summary":"SUSE Bug 1181931","url":"https://bugzilla.suse.com/1181931"},{"category":"self","summary":"SUSE Bug 1181960","url":"https://bugzilla.suse.com/1181960"},{"category":"self","summary":"SUSE Bug 1181985","url":"https://bugzilla.suse.com/1181985"},{"category":"self","summary":"SUSE Bug 1181987","url":"https://bugzilla.suse.com/1181987"},{"category":"self","summary":"SUSE Bug 1181996","url":"https://bugzilla.suse.com/1181996"},{"category":"self","summary":"SUSE Bug 1181998","url":"https://bugzilla.suse.com/1181998"},{"category":"self","summary":"SUSE Bug 1182038","url":"https://bugzilla.suse.com/1182038"},{"category":"self","summary":"SUSE Bug 1182047","url":"https://bugzilla.suse.com/1182047"},{"category":"self","summary":"SUSE Bug 1182118","url":"https://bugzilla.suse.com/1182118"},{"category":"self","summary":"SUSE Bug 1182130","url":"https://bugzilla.suse.com/1182130"},{"category":"self","summary":"SUSE Bug 1182140","url":"https://bugzilla.suse.com/1182140"},{"category":"self","summary":"SUSE Bug 1182171","url":"https://bugzilla.suse.com/1182171"},{"category":"self","summary":"SUSE Bug 1182173","url":"https://bugzilla.suse.com/1182173"},{"category":"self","summary":"SUSE Bug 1182175","url":"https://bugzilla.suse.com/1182175"},{"category":"self","summary":"SUSE Bug 1182182","url":"https://bugzilla.suse.com/1182182"},{"category":"self","summary":"SUSE Bug 1182184","url":"https://bugzilla.suse.com/1182184"},{"category":"self","summary":"SUSE Bug 1182195","url":"https://bugzilla.suse.com/1182195"},{"category":"self","summary":"SUSE Bug 1182242","url":"https://bugzilla.suse.com/1182242"},{"category":"self","summary":"SUSE Bug 1182243","url":"https://bugzilla.suse.com/1182243"},{"category":"self","summary":"SUSE Bug 1182248","url":"https://bugzilla.suse.com/1182248"},{"category":"self","summary":"SUSE Bug 1182269","url":"https://bugzilla.suse.com/1182269"},{"category":"self","summary":"SUSE Bug 1182302","url":"https://bugzilla.suse.com/1182302"},{"category":"self","summary":"SUSE Bug 1182307","url":"https://bugzilla.suse.com/1182307"},{"category":"self","summary":"SUSE Bug 1182310","url":"https://bugzilla.suse.com/1182310"},{"category":"self","summary":"SUSE Bug 1182438","url":"https://bugzilla.suse.com/1182438"},{"category":"self","summary":"SUSE Bug 1182447","url":"https://bugzilla.suse.com/1182447"},{"category":"self","summary":"SUSE Bug 1182448","url":"https://bugzilla.suse.com/1182448"},{"category":"self","summary":"SUSE Bug 1182449","url":"https://bugzilla.suse.com/1182449"},{"category":"self","summary":"SUSE Bug 1182460","url":"https://bugzilla.suse.com/1182460"},{"category":"self","summary":"SUSE Bug 1182461","url":"https://bugzilla.suse.com/1182461"},{"category":"self","summary":"SUSE Bug 1182462","url":"https://bugzilla.suse.com/1182462"},{"category":"self","summary":"SUSE Bug 1182463","url":"https://bugzilla.suse.com/1182463"},{"category":"self","summary":"SUSE Bug 1182464","url":"https://bugzilla.suse.com/1182464"},{"category":"self","summary":"SUSE Bug 1182465","url":"https://bugzilla.suse.com/1182465"},{"category":"self","summary":"SUSE Bug 1182466","url":"https://bugzilla.suse.com/1182466"},{"category":"self","summary":"SUSE Bug 1182560","url":"https://bugzilla.suse.com/1182560"},{"category":"self","summary":"SUSE Bug 1182561","url":"https://bugzilla.suse.com/1182561"},{"category":"self","summary":"SUSE Bug 1182571","url":"https://bugzilla.suse.com/1182571"},{"category":"self","summary":"SUSE Bug 1182590","url":"https://bugzilla.suse.com/1182590"},{"category":"self","summary":"SUSE Bug 1182610","url":"https://bugzilla.suse.com/1182610"},{"category":"self","summary":"SUSE Bug 1182612","url":"https://bugzilla.suse.com/1182612"},{"category":"self","summary":"SUSE Bug 1182650","url":"https://bugzilla.suse.com/1182650"},{"category":"self","summary":"SUSE Bug 1182652","url":"https://bugzilla.suse.com/1182652"},{"category":"self","summary":"SUSE CVE CVE-2021-3348 page","url":"https://www.suse.com/security/cve/CVE-2021-3348/"}],"title":"Security update for the Linux Kernel","tracking":{"current_release_date":"2021-03-09T15:13:52Z","generator":{"date":"2021-03-09T15:13:52Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"SUSE-SU-2021:0742-1","initial_release_date":"2021-03-09T15:13:52Z","revision_history":[{"date":"2021-03-09T15:13:52Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"cluster-md-kmp-default-4.12.14-122.63.1.aarch64","product":{"name":"cluster-md-kmp-default-4.12.14-122.63.1.aarch64","product_id":"cluster-md-kmp-default-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"dlm-kmp-default-4.12.14-122.63.1.aarch64","product":{"name":"dlm-kmp-default-4.12.14-122.63.1.aarch64","product_id":"dlm-kmp-default-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"gfs2-kmp-default-4.12.14-122.63.1.aarch64","product":{"name":"gfs2-kmp-default-4.12.14-122.63.1.aarch64","product_id":"gfs2-kmp-default-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-default-4.12.14-122.63.1.aarch64","product":{"name":"kernel-default-4.12.14-122.63.1.aarch64","product_id":"kernel-default-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-default-base-4.12.14-122.63.1.aarch64","product":{"name":"kernel-default-base-4.12.14-122.63.1.aarch64","product_id":"kernel-default-base-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-default-devel-4.12.14-122.63.1.aarch64","product":{"name":"kernel-default-devel-4.12.14-122.63.1.aarch64","product_id":"kernel-default-devel-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-default-extra-4.12.14-122.63.1.aarch64","product":{"name":"kernel-default-extra-4.12.14-122.63.1.aarch64","product_id":"kernel-default-extra-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-default-kgraft-4.12.14-122.63.1.aarch64","product":{"name":"kernel-default-kgraft-4.12.14-122.63.1.aarch64","product_id":"kernel-default-kgraft-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-default-kgraft-devel-4.12.14-122.63.1.aarch64","product":{"name":"kernel-default-kgraft-devel-4.12.14-122.63.1.aarch64","product_id":"kernel-default-kgraft-devel-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-obs-build-4.12.14-122.63.1.aarch64","product":{"name":"kernel-obs-build-4.12.14-122.63.1.aarch64","product_id":"kernel-obs-build-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-obs-qa-4.12.14-122.63.1.aarch64","product":{"name":"kernel-obs-qa-4.12.14-122.63.1.aarch64","product_id":"kernel-obs-qa-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-syms-4.12.14-122.63.1.aarch64","product":{"name":"kernel-syms-4.12.14-122.63.1.aarch64","product_id":"kernel-syms-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-vanilla-4.12.14-122.63.1.aarch64","product":{"name":"kernel-vanilla-4.12.14-122.63.1.aarch64","product_id":"kernel-vanilla-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-vanilla-base-4.12.14-122.63.1.aarch64","product":{"name":"kernel-vanilla-base-4.12.14-122.63.1.aarch64","product_id":"kernel-vanilla-base-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-vanilla-devel-4.12.14-122.63.1.aarch64","product":{"name":"kernel-vanilla-devel-4.12.14-122.63.1.aarch64","product_id":"kernel-vanilla-devel-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.aarch64","product":{"name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.aarch64","product_id":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"kselftests-kmp-default-4.12.14-122.63.1.aarch64","product":{"name":"kselftests-kmp-default-4.12.14-122.63.1.aarch64","product_id":"kselftests-kmp-default-4.12.14-122.63.1.aarch64"}},{"category":"product_version","name":"ocfs2-kmp-default-4.12.14-122.63.1.aarch64","product":{"name":"ocfs2-kmp-default-4.12.14-122.63.1.aarch64","product_id":"ocfs2-kmp-default-4.12.14-122.63.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"kernel-devel-4.12.14-122.63.1.noarch","product":{"name":"kernel-devel-4.12.14-122.63.1.noarch","product_id":"kernel-devel-4.12.14-122.63.1.noarch"}},{"category":"product_version","name":"kernel-docs-4.12.14-122.63.1.noarch","product":{"name":"kernel-docs-4.12.14-122.63.1.noarch","product_id":"kernel-docs-4.12.14-122.63.1.noarch"}},{"category":"product_version","name":"kernel-docs-html-4.12.14-122.63.1.noarch","product":{"name":"kernel-docs-html-4.12.14-122.63.1.noarch","product_id":"kernel-docs-html-4.12.14-122.63.1.noarch"}},{"category":"product_version","name":"kernel-macros-4.12.14-122.63.1.noarch","product":{"name":"kernel-macros-4.12.14-122.63.1.noarch","product_id":"kernel-macros-4.12.14-122.63.1.noarch"}},{"category":"product_version","name":"kernel-source-4.12.14-122.63.1.noarch","product":{"name":"kernel-source-4.12.14-122.63.1.noarch","product_id":"kernel-source-4.12.14-122.63.1.noarch"}},{"category":"product_version","name":"kernel-source-vanilla-4.12.14-122.63.1.noarch","product":{"name":"kernel-source-vanilla-4.12.14-122.63.1.noarch","product_id":"kernel-source-vanilla-4.12.14-122.63.1.noarch"}}],"category":"architecture","name":"noarch"},{"branches":[{"category":"product_version","name":"cluster-md-kmp-default-4.12.14-122.63.1.ppc64le","product":{"name":"cluster-md-kmp-default-4.12.14-122.63.1.ppc64le","product_id":"cluster-md-kmp-default-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"dlm-kmp-default-4.12.14-122.63.1.ppc64le","product":{"name":"dlm-kmp-default-4.12.14-122.63.1.ppc64le","product_id":"dlm-kmp-default-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"gfs2-kmp-default-4.12.14-122.63.1.ppc64le","product":{"name":"gfs2-kmp-default-4.12.14-122.63.1.ppc64le","product_id":"gfs2-kmp-default-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-debug-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-debug-4.12.14-122.63.1.ppc64le","product_id":"kernel-debug-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-debug-base-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-debug-base-4.12.14-122.63.1.ppc64le","product_id":"kernel-debug-base-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-debug-devel-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-debug-devel-4.12.14-122.63.1.ppc64le","product_id":"kernel-debug-devel-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-debug-kgraft-devel-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-debug-kgraft-devel-4.12.14-122.63.1.ppc64le","product_id":"kernel-debug-kgraft-devel-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-default-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-default-4.12.14-122.63.1.ppc64le","product_id":"kernel-default-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-default-base-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-default-base-4.12.14-122.63.1.ppc64le","product_id":"kernel-default-base-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-default-devel-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-default-devel-4.12.14-122.63.1.ppc64le","product_id":"kernel-default-devel-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-default-extra-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-default-extra-4.12.14-122.63.1.ppc64le","product_id":"kernel-default-extra-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-default-kgraft-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-default-kgraft-4.12.14-122.63.1.ppc64le","product_id":"kernel-default-kgraft-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le","product_id":"kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-obs-build-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-obs-build-4.12.14-122.63.1.ppc64le","product_id":"kernel-obs-build-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-obs-qa-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-obs-qa-4.12.14-122.63.1.ppc64le","product_id":"kernel-obs-qa-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-syms-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-syms-4.12.14-122.63.1.ppc64le","product_id":"kernel-syms-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-vanilla-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-vanilla-4.12.14-122.63.1.ppc64le","product_id":"kernel-vanilla-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-vanilla-base-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-vanilla-base-4.12.14-122.63.1.ppc64le","product_id":"kernel-vanilla-base-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-vanilla-devel-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-vanilla-devel-4.12.14-122.63.1.ppc64le","product_id":"kernel-vanilla-devel-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.ppc64le","product":{"name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.ppc64le","product_id":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le","product":{"name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le","product_id":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le"}},{"category":"product_version","name":"kselftests-kmp-default-4.12.14-122.63.1.ppc64le","product":{"name":"kselftests-kmp-default-4.12.14-122.63.1.ppc64le","product_id":"kselftests-kmp-default-4.12.14-122.63.1.ppc64le"}},{"category":"product_version","name":"ocfs2-kmp-default-4.12.14-122.63.1.ppc64le","product":{"name":"ocfs2-kmp-default-4.12.14-122.63.1.ppc64le","product_id":"ocfs2-kmp-default-4.12.14-122.63.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"cluster-md-kmp-default-4.12.14-122.63.1.s390x","product":{"name":"cluster-md-kmp-default-4.12.14-122.63.1.s390x","product_id":"cluster-md-kmp-default-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"dlm-kmp-default-4.12.14-122.63.1.s390x","product":{"name":"dlm-kmp-default-4.12.14-122.63.1.s390x","product_id":"dlm-kmp-default-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"gfs2-kmp-default-4.12.14-122.63.1.s390x","product":{"name":"gfs2-kmp-default-4.12.14-122.63.1.s390x","product_id":"gfs2-kmp-default-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-default-4.12.14-122.63.1.s390x","product":{"name":"kernel-default-4.12.14-122.63.1.s390x","product_id":"kernel-default-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-default-base-4.12.14-122.63.1.s390x","product":{"name":"kernel-default-base-4.12.14-122.63.1.s390x","product_id":"kernel-default-base-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-default-devel-4.12.14-122.63.1.s390x","product":{"name":"kernel-default-devel-4.12.14-122.63.1.s390x","product_id":"kernel-default-devel-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-default-extra-4.12.14-122.63.1.s390x","product":{"name":"kernel-default-extra-4.12.14-122.63.1.s390x","product_id":"kernel-default-extra-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-default-kgraft-4.12.14-122.63.1.s390x","product":{"name":"kernel-default-kgraft-4.12.14-122.63.1.s390x","product_id":"kernel-default-kgraft-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-default-kgraft-devel-4.12.14-122.63.1.s390x","product":{"name":"kernel-default-kgraft-devel-4.12.14-122.63.1.s390x","product_id":"kernel-default-kgraft-devel-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-default-man-4.12.14-122.63.1.s390x","product":{"name":"kernel-default-man-4.12.14-122.63.1.s390x","product_id":"kernel-default-man-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-obs-build-4.12.14-122.63.1.s390x","product":{"name":"kernel-obs-build-4.12.14-122.63.1.s390x","product_id":"kernel-obs-build-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-obs-qa-4.12.14-122.63.1.s390x","product":{"name":"kernel-obs-qa-4.12.14-122.63.1.s390x","product_id":"kernel-obs-qa-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-syms-4.12.14-122.63.1.s390x","product":{"name":"kernel-syms-4.12.14-122.63.1.s390x","product_id":"kernel-syms-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-vanilla-4.12.14-122.63.1.s390x","product":{"name":"kernel-vanilla-4.12.14-122.63.1.s390x","product_id":"kernel-vanilla-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-vanilla-base-4.12.14-122.63.1.s390x","product":{"name":"kernel-vanilla-base-4.12.14-122.63.1.s390x","product_id":"kernel-vanilla-base-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-vanilla-devel-4.12.14-122.63.1.s390x","product":{"name":"kernel-vanilla-devel-4.12.14-122.63.1.s390x","product_id":"kernel-vanilla-devel-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.s390x","product":{"name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.s390x","product_id":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-zfcpdump-4.12.14-122.63.1.s390x","product":{"name":"kernel-zfcpdump-4.12.14-122.63.1.s390x","product_id":"kernel-zfcpdump-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kernel-zfcpdump-man-4.12.14-122.63.1.s390x","product":{"name":"kernel-zfcpdump-man-4.12.14-122.63.1.s390x","product_id":"kernel-zfcpdump-man-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x","product":{"name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x","product_id":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x"}},{"category":"product_version","name":"kselftests-kmp-default-4.12.14-122.63.1.s390x","product":{"name":"kselftests-kmp-default-4.12.14-122.63.1.s390x","product_id":"kselftests-kmp-default-4.12.14-122.63.1.s390x"}},{"category":"product_version","name":"ocfs2-kmp-default-4.12.14-122.63.1.s390x","product":{"name":"ocfs2-kmp-default-4.12.14-122.63.1.s390x","product_id":"ocfs2-kmp-default-4.12.14-122.63.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"cluster-md-kmp-default-4.12.14-122.63.1.x86_64","product":{"name":"cluster-md-kmp-default-4.12.14-122.63.1.x86_64","product_id":"cluster-md-kmp-default-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"dlm-kmp-default-4.12.14-122.63.1.x86_64","product":{"name":"dlm-kmp-default-4.12.14-122.63.1.x86_64","product_id":"dlm-kmp-default-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"gfs2-kmp-default-4.12.14-122.63.1.x86_64","product":{"name":"gfs2-kmp-default-4.12.14-122.63.1.x86_64","product_id":"gfs2-kmp-default-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-debug-4.12.14-122.63.1.x86_64","product":{"name":"kernel-debug-4.12.14-122.63.1.x86_64","product_id":"kernel-debug-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-debug-base-4.12.14-122.63.1.x86_64","product":{"name":"kernel-debug-base-4.12.14-122.63.1.x86_64","product_id":"kernel-debug-base-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-debug-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-debug-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-debug-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-debug-kgraft-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-debug-kgraft-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-debug-kgraft-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-default-4.12.14-122.63.1.x86_64","product":{"name":"kernel-default-4.12.14-122.63.1.x86_64","product_id":"kernel-default-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-default-base-4.12.14-122.63.1.x86_64","product":{"name":"kernel-default-base-4.12.14-122.63.1.x86_64","product_id":"kernel-default-base-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-default-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-default-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-default-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-default-extra-4.12.14-122.63.1.x86_64","product":{"name":"kernel-default-extra-4.12.14-122.63.1.x86_64","product_id":"kernel-default-extra-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-default-kgraft-4.12.14-122.63.1.x86_64","product":{"name":"kernel-default-kgraft-4.12.14-122.63.1.x86_64","product_id":"kernel-default-kgraft-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-kvmsmall-4.12.14-122.63.1.x86_64","product":{"name":"kernel-kvmsmall-4.12.14-122.63.1.x86_64","product_id":"kernel-kvmsmall-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-kvmsmall-base-4.12.14-122.63.1.x86_64","product":{"name":"kernel-kvmsmall-base-4.12.14-122.63.1.x86_64","product_id":"kernel-kvmsmall-base-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-kvmsmall-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-kvmsmall-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-kvmsmall-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-kvmsmall-kgraft-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-kvmsmall-kgraft-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-kvmsmall-kgraft-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-obs-build-4.12.14-122.63.1.x86_64","product":{"name":"kernel-obs-build-4.12.14-122.63.1.x86_64","product_id":"kernel-obs-build-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-obs-qa-4.12.14-122.63.1.x86_64","product":{"name":"kernel-obs-qa-4.12.14-122.63.1.x86_64","product_id":"kernel-obs-qa-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-syms-4.12.14-122.63.1.x86_64","product":{"name":"kernel-syms-4.12.14-122.63.1.x86_64","product_id":"kernel-syms-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-4.12.14-122.63.1.x86_64","product":{"name":"kernel-vanilla-4.12.14-122.63.1.x86_64","product_id":"kernel-vanilla-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-base-4.12.14-122.63.1.x86_64","product":{"name":"kernel-vanilla-base-4.12.14-122.63.1.x86_64","product_id":"kernel-vanilla-base-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-vanilla-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-vanilla-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.x86_64","product":{"name":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.x86_64","product_id":"kernel-vanilla-kgraft-devel-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64","product":{"name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64","product_id":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64"}},{"category":"product_version","name":"kselftests-kmp-default-4.12.14-122.63.1.x86_64","product":{"name":"kselftests-kmp-default-4.12.14-122.63.1.x86_64","product_id":"kselftests-kmp-default-4.12.14-122.63.1.x86_64"}},{"category":"product_version","name":"ocfs2-kmp-default-4.12.14-122.63.1.x86_64","product":{"name":"ocfs2-kmp-default-4.12.14-122.63.1.x86_64","product_id":"ocfs2-kmp-default-4.12.14-122.63.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise High Availability Extension 12 SP5","product":{"name":"SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sle-ha:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Live Patching 12 SP5","product":{"name":"SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sle-live-patching:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Software Development Kit 12 SP5","product":{"name":"SUSE Linux Enterprise Software Development Kit 12 SP5","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sle-sdk:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server 12 SP5","product":{"name":"SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sles:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product":{"name":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sles_sap:12:sp5"}}},{"category":"product_name","name":"SUSE Linux Enterprise Workstation Extension 12 SP5","product":{"name":"SUSE Linux Enterprise Workstation Extension 12 SP5","product_id":"SUSE Linux Enterprise Workstation Extension 12 SP5","product_identification_helper":{"cpe":"cpe:/o:suse:sle-we:12:sp5"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"cluster-md-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le"},"product_reference":"cluster-md-kmp-default-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"cluster-md-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x"},"product_reference":"cluster-md-kmp-default-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"cluster-md-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64"},"product_reference":"cluster-md-kmp-default-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"dlm-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le"},"product_reference":"dlm-kmp-default-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"dlm-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x"},"product_reference":"dlm-kmp-default-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"dlm-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64"},"product_reference":"dlm-kmp-default-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"gfs2-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le"},"product_reference":"gfs2-kmp-default-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"gfs2-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x"},"product_reference":"gfs2-kmp-default-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"gfs2-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64"},"product_reference":"gfs2-kmp-default-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"ocfs2-kmp-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le"},"product_reference":"ocfs2-kmp-default-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"ocfs2-kmp-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x"},"product_reference":"ocfs2-kmp-default-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"ocfs2-kmp-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise High Availability Extension 12 SP5","product_id":"SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64"},"product_reference":"ocfs2-kmp-default-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise High Availability Extension 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-kgraft-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-kgraft-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-kgraft-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-kgraft-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-kgraft-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-kgraft-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-kgraft-devel-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-kgraft-devel-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le"},"product_reference":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x"},"product_reference":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64 as component of SUSE Linux Enterprise Live Patching 12 SP5","product_id":"SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64"},"product_reference":"kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Live Patching 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-docs-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Software Development Kit 12 SP5","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch"},"product_reference":"kernel-docs-4.12.14-122.63.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-obs-build-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-obs-build-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-obs-build-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-obs-build-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-obs-build-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x"},"product_reference":"kernel-obs-build-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-obs-build-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5","product_id":"SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-obs-build-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Software Development Kit 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-default-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-default-base-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-base-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-base-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-base-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-man-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-man-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch"},"product_reference":"kernel-devel-4.12.14-122.63.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-macros-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch"},"product_reference":"kernel-macros-4.12.14-122.63.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch"},"product_reference":"kernel-source-4.12.14-122.63.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-syms-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-syms-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x"},"product_reference":"kernel-syms-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5","product_id":"SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-syms-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-default-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-default-base-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-base-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-base-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-base-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-base-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-devel-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-devel-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-man-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x"},"product_reference":"kernel-default-man-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-devel-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch"},"product_reference":"kernel-devel-4.12.14-122.63.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-macros-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch"},"product_reference":"kernel-macros-4.12.14-122.63.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-source-4.12.14-122.63.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch"},"product_reference":"kernel-source-4.12.14-122.63.1.noarch","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64"},"product_reference":"kernel-syms-4.12.14-122.63.1.aarch64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le"},"product_reference":"kernel-syms-4.12.14-122.63.1.ppc64le","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x"},"product_reference":"kernel-syms-4.12.14-122.63.1.s390x","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-syms-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5","product_id":"SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-syms-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Server for SAP Applications 12 SP5"},{"category":"default_component_of","full_product_name":{"name":"kernel-default-extra-4.12.14-122.63.1.x86_64 as component of SUSE Linux Enterprise Workstation Extension 12 SP5","product_id":"SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64"},"product_reference":"kernel-default-extra-4.12.14-122.63.1.x86_64","relates_to_product_reference":"SUSE Linux Enterprise Workstation Extension 12 SP5"}]},"vulnerabilities":[{"cve":"CVE-2021-3348","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2021-3348"}],"notes":[{"category":"general","text":"nbd_add_socket in drivers/block/nbd.c in the Linux kernel through 5.10.12 has an ndb_queue_rq use-after-free that could be triggered by local attackers (with access to the nbd device) via an I/O request at a certain point during device setup, aka CID-b98e762e3d71.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2021-3348","url":"https://www.suse.com/security/cve/CVE-2021-3348"},{"category":"external","summary":"SUSE Bug 1181504 for CVE-2021-3348","url":"https://bugzilla.suse.com/1181504"},{"category":"external","summary":"SUSE Bug 1181645 for CVE-2021-3348","url":"https://bugzilla.suse.com/1181645"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.1,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:cluster-md-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:dlm-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:gfs2-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise High Availability Extension 12 SP5:ocfs2-kmp-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kernel-default-kgraft-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.ppc64le","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.s390x","SUSE Linux Enterprise Live Patching 12 SP5:kgraft-patch-4_12_14-122_63-default-1-8.3.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-devel-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-macros-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-source-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-base-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-devel-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-default-man-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-devel-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-macros-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-source-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Server for SAP Applications 12 SP5:kernel-syms-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-docs-4.12.14-122.63.1.noarch","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.aarch64","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.ppc64le","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.s390x","SUSE Linux Enterprise Software Development Kit 12 SP5:kernel-obs-build-4.12.14-122.63.1.x86_64","SUSE Linux Enterprise Workstation Extension 12 SP5:kernel-default-extra-4.12.14-122.63.1.x86_64"]}],"threats":[{"category":"impact","date":"2021-03-09T15:13:52Z","details":"moderate"}],"title":"CVE-2021-3348"}]}